Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/libdmx@1.1.3-3?arch=el6
Typerpm
Namespaceredhat
Namelibdmx
Version1.1.3-3
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1ngj-ep8k-3bbc
vulnerability_id VCID-1ngj-ep8k-3bbc
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1999
reference_id
reference_type
scores
0
value 0.00906
scoring_system epss
scoring_elements 0.75774
published_at 2026-04-21T12:55:00Z
1
value 0.00906
scoring_system epss
scoring_elements 0.75691
published_at 2026-04-01T12:55:00Z
2
value 0.00906
scoring_system epss
scoring_elements 0.75693
published_at 2026-04-02T12:55:00Z
3
value 0.00906
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-04T12:55:00Z
4
value 0.00906
scoring_system epss
scoring_elements 0.75703
published_at 2026-04-07T12:55:00Z
5
value 0.00906
scoring_system epss
scoring_elements 0.75737
published_at 2026-04-08T12:55:00Z
6
value 0.00906
scoring_system epss
scoring_elements 0.75749
published_at 2026-04-09T12:55:00Z
7
value 0.00906
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-11T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75754
published_at 2026-04-12T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-13T12:55:00Z
10
value 0.00906
scoring_system epss
scoring_elements 0.75785
published_at 2026-04-16T12:55:00Z
11
value 0.00906
scoring_system epss
scoring_elements 0.75789
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1999
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
6
reference_url http://www.debian.org/security/2013/dsa-2675
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2675
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1868-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1868-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960347
reference_id 960347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960347
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1999
reference_id CVE-2013-1999
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1999
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
20
reference_url https://usn.ubuntu.com/1868-1/
reference_id USN-1868-1
reference_type
scores
url https://usn.ubuntu.com/1868-1/
fixed_packages
aliases CVE-2013-1999
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ngj-ep8k-3bbc
1
url VCID-3ap5-ppvg-juc1
vulnerability_id VCID-3ap5-ppvg-juc1
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1988
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74509
published_at 2026-04-21T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.74423
published_at 2026-04-01T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-02T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.74454
published_at 2026-04-04T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-07T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.74461
published_at 2026-04-08T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74478
published_at 2026-04-09T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.745
published_at 2026-04-11T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.74481
published_at 2026-04-12T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74472
published_at 2026-04-13T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.7451
published_at 2026-04-16T12:55:00Z
11
value 0.00826
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1988
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
5
reference_url http://www.debian.org/security/2013/dsa-2688
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2688
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1864-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959066
reference_id 959066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959066
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1988
reference_id CVE-2013-1988
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1988
17
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
18
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
19
reference_url https://usn.ubuntu.com/1864-1/
reference_id USN-1864-1
reference_type
scores
url https://usn.ubuntu.com/1864-1/
fixed_packages
aliases CVE-2013-1988
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ap5-ppvg-juc1
2
url VCID-3cdg-93ke-8fa9
vulnerability_id VCID-3cdg-93ke-8fa9
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1986
reference_id
reference_type
scores
0
value 0.00904
scoring_system epss
scoring_elements 0.75738
published_at 2026-04-21T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75654
published_at 2026-04-01T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-02T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-04T12:55:00Z
4
value 0.00904
scoring_system epss
scoring_elements 0.75666
published_at 2026-04-07T12:55:00Z
5
value 0.00904
scoring_system epss
scoring_elements 0.75701
published_at 2026-04-08T12:55:00Z
6
value 0.00904
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-09T12:55:00Z
7
value 0.00904
scoring_system epss
scoring_elements 0.75736
published_at 2026-04-11T12:55:00Z
8
value 0.00904
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-12T12:55:00Z
9
value 0.00904
scoring_system epss
scoring_elements 0.7571
published_at 2026-04-13T12:55:00Z
10
value 0.00904
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-16T12:55:00Z
11
value 0.00904
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1986
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986
5
reference_url http://www.debian.org/security/2013/dsa-2684
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2684
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1862-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1862-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959059
reference_id 959059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959059
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1986
reference_id CVE-2013-1986
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1986
20
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
21
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
22
reference_url https://usn.ubuntu.com/1862-1/
reference_id USN-1862-1
reference_type
scores
url https://usn.ubuntu.com/1862-1/
fixed_packages
aliases CVE-2013-1986
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cdg-93ke-8fa9
3
url VCID-5323-m7nb-6yax
vulnerability_id VCID-5323-m7nb-6yax
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1991
reference_id
reference_type
scores
0
value 0.00683
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-21T12:55:00Z
1
value 0.00683
scoring_system epss
scoring_elements 0.71598
published_at 2026-04-01T12:55:00Z
2
value 0.00683
scoring_system epss
scoring_elements 0.71604
published_at 2026-04-02T12:55:00Z
3
value 0.00683
scoring_system epss
scoring_elements 0.71622
published_at 2026-04-04T12:55:00Z
4
value 0.00683
scoring_system epss
scoring_elements 0.71595
published_at 2026-04-07T12:55:00Z
5
value 0.00683
scoring_system epss
scoring_elements 0.71634
published_at 2026-04-13T12:55:00Z
6
value 0.00683
scoring_system epss
scoring_elements 0.71645
published_at 2026-04-09T12:55:00Z
7
value 0.00683
scoring_system epss
scoring_elements 0.71669
published_at 2026-04-11T12:55:00Z
8
value 0.00683
scoring_system epss
scoring_elements 0.71652
published_at 2026-04-12T12:55:00Z
9
value 0.00683
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-16T12:55:00Z
10
value 0.00683
scoring_system epss
scoring_elements 0.71683
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1991
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
5
reference_url http://www.debian.org/security/2013/dsa-2690
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2690
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1869-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1869-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959072
reference_id 959072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959072
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1991
reference_id CVE-2013-1991
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1991
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1869-1/
reference_id USN-1869-1
reference_type
scores
url https://usn.ubuntu.com/1869-1/
fixed_packages
aliases CVE-2013-1991
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5323-m7nb-6yax
4
url VCID-8aha-x3r3-uqen
vulnerability_id VCID-8aha-x3r3-uqen
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1990
reference_id
reference_type
scores
0
value 0.00904
scoring_system epss
scoring_elements 0.75738
published_at 2026-04-21T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75654
published_at 2026-04-01T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-02T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-04T12:55:00Z
4
value 0.00904
scoring_system epss
scoring_elements 0.75666
published_at 2026-04-07T12:55:00Z
5
value 0.00904
scoring_system epss
scoring_elements 0.75701
published_at 2026-04-08T12:55:00Z
6
value 0.00904
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-09T12:55:00Z
7
value 0.00904
scoring_system epss
scoring_elements 0.75736
published_at 2026-04-11T12:55:00Z
8
value 0.00904
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-12T12:55:00Z
9
value 0.00904
scoring_system epss
scoring_elements 0.7571
published_at 2026-04-13T12:55:00Z
10
value 0.00904
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-16T12:55:00Z
11
value 0.00904
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1990
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
6
reference_url http://www.debian.org/security/2013/dsa-2675
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2675
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1868-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1868-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959070
reference_id 959070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959070
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1990
reference_id CVE-2013-1990
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1990
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
20
reference_url https://usn.ubuntu.com/1868-1/
reference_id USN-1868-1
reference_type
scores
url https://usn.ubuntu.com/1868-1/
fixed_packages
aliases CVE-2013-1990
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8aha-x3r3-uqen
5
url VCID-9jjr-recn-f3a2
vulnerability_id VCID-9jjr-recn-f3a2
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2001
reference_id
reference_type
scores
0
value 0.0115
scoring_system epss
scoring_elements 0.78507
published_at 2026-04-21T12:55:00Z
1
value 0.0115
scoring_system epss
scoring_elements 0.78432
published_at 2026-04-01T12:55:00Z
2
value 0.0115
scoring_system epss
scoring_elements 0.78438
published_at 2026-04-02T12:55:00Z
3
value 0.0115
scoring_system epss
scoring_elements 0.78469
published_at 2026-04-04T12:55:00Z
4
value 0.0115
scoring_system epss
scoring_elements 0.78453
published_at 2026-04-07T12:55:00Z
5
value 0.0115
scoring_system epss
scoring_elements 0.78479
published_at 2026-04-08T12:55:00Z
6
value 0.0115
scoring_system epss
scoring_elements 0.78485
published_at 2026-04-09T12:55:00Z
7
value 0.0115
scoring_system epss
scoring_elements 0.7851
published_at 2026-04-11T12:55:00Z
8
value 0.0115
scoring_system epss
scoring_elements 0.78491
published_at 2026-04-12T12:55:00Z
9
value 0.0115
scoring_system epss
scoring_elements 0.78484
published_at 2026-04-13T12:55:00Z
10
value 0.0115
scoring_system epss
scoring_elements 0.78511
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2001
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001
5
reference_url http://www.debian.org/security/2013/dsa-2692
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2692
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1870-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1870-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960350
reference_id 960350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960350
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2001
reference_id CVE-2013-2001
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2001
17
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
18
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
19
reference_url https://usn.ubuntu.com/1870-1/
reference_id USN-1870-1
reference_type
scores
url https://usn.ubuntu.com/1870-1/
fixed_packages
aliases CVE-2013-2001
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jjr-recn-f3a2
6
url VCID-ckk4-x9aw-8qh7
vulnerability_id VCID-ckk4-x9aw-8qh7
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1987
reference_id
reference_type
scores
0
value 0.00894
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-18T12:55:00Z
1
value 0.00894
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-01T12:55:00Z
2
value 0.00894
scoring_system epss
scoring_elements 0.75526
published_at 2026-04-02T12:55:00Z
3
value 0.00894
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-04T12:55:00Z
4
value 0.00894
scoring_system epss
scoring_elements 0.75536
published_at 2026-04-07T12:55:00Z
5
value 0.00894
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-08T12:55:00Z
6
value 0.00894
scoring_system epss
scoring_elements 0.75588
published_at 2026-04-13T12:55:00Z
7
value 0.00894
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-21T12:55:00Z
8
value 0.00894
scoring_system epss
scoring_elements 0.75595
published_at 2026-04-12T12:55:00Z
9
value 0.00894
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1987
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987
5
reference_url http://www.debian.org/security/2013/dsa-2677
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2677
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.securityfocus.com/bid/60132
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60132
8
reference_url http://www.ubuntu.com/usn/USN-1863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1863-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959061
reference_id 959061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959061
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1987
reference_id CVE-2013-1987
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1987
25
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
26
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
27
reference_url https://usn.ubuntu.com/1863-1/
reference_id USN-1863-1
reference_type
scores
url https://usn.ubuntu.com/1863-1/
fixed_packages
aliases CVE-2013-1987
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckk4-x9aw-8qh7
7
url VCID-cv5u-c5s5-fqfp
vulnerability_id VCID-cv5u-c5s5-fqfp
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2062
reference_id
reference_type
scores
0
value 0.00546
scoring_system epss
scoring_elements 0.67865
published_at 2026-04-21T12:55:00Z
1
value 0.00546
scoring_system epss
scoring_elements 0.67764
published_at 2026-04-01T12:55:00Z
2
value 0.00546
scoring_system epss
scoring_elements 0.67797
published_at 2026-04-07T12:55:00Z
3
value 0.00546
scoring_system epss
scoring_elements 0.67817
published_at 2026-04-04T12:55:00Z
4
value 0.00546
scoring_system epss
scoring_elements 0.67848
published_at 2026-04-08T12:55:00Z
5
value 0.00546
scoring_system epss
scoring_elements 0.67861
published_at 2026-04-09T12:55:00Z
6
value 0.00546
scoring_system epss
scoring_elements 0.67885
published_at 2026-04-11T12:55:00Z
7
value 0.00546
scoring_system epss
scoring_elements 0.67871
published_at 2026-04-16T12:55:00Z
8
value 0.00546
scoring_system epss
scoring_elements 0.67835
published_at 2026-04-13T12:55:00Z
9
value 0.00546
scoring_system epss
scoring_elements 0.67883
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2062
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062
4
reference_url http://www.debian.org/security/2013/dsa-2685
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2685
5
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
6
reference_url http://www.ubuntu.com/usn/USN-1861-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1861-1
7
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960362
reference_id 960362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960362
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2062
reference_id CVE-2013-2062
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2062
12
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
13
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
14
reference_url https://usn.ubuntu.com/1861-1/
reference_id USN-1861-1
reference_type
scores
url https://usn.ubuntu.com/1861-1/
fixed_packages
aliases CVE-2013-2062
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cv5u-c5s5-fqfp
8
url VCID-dcgs-qd3h-k7gq
vulnerability_id VCID-dcgs-qd3h-k7gq
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
reference_id
reference_type
scores
0
value 0.00393
scoring_system epss
scoring_elements 0.60313
published_at 2026-04-18T12:55:00Z
1
value 0.00393
scoring_system epss
scoring_elements 0.60145
published_at 2026-04-01T12:55:00Z
2
value 0.00393
scoring_system epss
scoring_elements 0.60221
published_at 2026-04-02T12:55:00Z
3
value 0.00393
scoring_system epss
scoring_elements 0.60247
published_at 2026-04-04T12:55:00Z
4
value 0.00393
scoring_system epss
scoring_elements 0.60214
published_at 2026-04-07T12:55:00Z
5
value 0.00393
scoring_system epss
scoring_elements 0.60264
published_at 2026-04-08T12:55:00Z
6
value 0.00393
scoring_system epss
scoring_elements 0.60278
published_at 2026-04-09T12:55:00Z
7
value 0.00393
scoring_system epss
scoring_elements 0.60299
published_at 2026-04-21T12:55:00Z
8
value 0.00393
scoring_system epss
scoring_elements 0.60286
published_at 2026-04-12T12:55:00Z
9
value 0.00393
scoring_system epss
scoring_elements 0.60266
published_at 2026-04-13T12:55:00Z
10
value 0.00393
scoring_system epss
scoring_elements 0.60306
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2004
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
5
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959112
reference_id 959112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959112
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
reference_id CVE-2013-2004
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2004
13
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
14
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
15
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
aliases CVE-2013-2004
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq
9
url VCID-dn3z-f522-hucu
vulnerability_id VCID-dn3z-f522-hucu
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1989
reference_id
reference_type
scores
0
value 0.00904
scoring_system epss
scoring_elements 0.75738
published_at 2026-04-21T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75654
published_at 2026-04-01T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-02T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-04T12:55:00Z
4
value 0.00904
scoring_system epss
scoring_elements 0.75666
published_at 2026-04-07T12:55:00Z
5
value 0.00904
scoring_system epss
scoring_elements 0.75701
published_at 2026-04-08T12:55:00Z
6
value 0.00904
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-09T12:55:00Z
7
value 0.00904
scoring_system epss
scoring_elements 0.75736
published_at 2026-04-11T12:55:00Z
8
value 0.00904
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-12T12:55:00Z
9
value 0.00904
scoring_system epss
scoring_elements 0.7571
published_at 2026-04-13T12:55:00Z
10
value 0.00904
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-16T12:55:00Z
11
value 0.00904
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1989
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
6
reference_url http://www.debian.org/security/2013/dsa-2674
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2674
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1867-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1867-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959068
reference_id 959068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959068
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1989
reference_id CVE-2013-1989
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1989
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
20
reference_url https://usn.ubuntu.com/1867-1/
reference_id USN-1867-1
reference_type
scores
url https://usn.ubuntu.com/1867-1/
fixed_packages
aliases CVE-2013-1989
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3z-f522-hucu
10
url VCID-e19k-nptv-ffgr
vulnerability_id VCID-e19k-nptv-ffgr
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
reference_id
reference_type
scores
0
value 0.01877
scoring_system epss
scoring_elements 0.83061
published_at 2026-04-01T12:55:00Z
1
value 0.01877
scoring_system epss
scoring_elements 0.83077
published_at 2026-04-02T12:55:00Z
2
value 0.01877
scoring_system epss
scoring_elements 0.83091
published_at 2026-04-04T12:55:00Z
3
value 0.01877
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-07T12:55:00Z
4
value 0.01877
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-08T12:55:00Z
5
value 0.01877
scoring_system epss
scoring_elements 0.83122
published_at 2026-04-09T12:55:00Z
6
value 0.01877
scoring_system epss
scoring_elements 0.83138
published_at 2026-04-11T12:55:00Z
7
value 0.01877
scoring_system epss
scoring_elements 0.83132
published_at 2026-04-12T12:55:00Z
8
value 0.01877
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-13T12:55:00Z
9
value 0.01877
scoring_system epss
scoring_elements 0.83165
published_at 2026-04-16T12:55:00Z
10
value 0.01877
scoring_system epss
scoring_elements 0.83166
published_at 2026-04-18T12:55:00Z
11
value 0.01877
scoring_system epss
scoring_elements 0.83169
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
reference_id 1209943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209943
4
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
5
reference_url https://usn.ubuntu.com/2568-1/
reference_id USN-2568-1
reference_type
scores
url https://usn.ubuntu.com/2568-1/
fixed_packages
aliases CVE-2013-7439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr
11
url VCID-euc5-hkmw-3qf9
vulnerability_id VCID-euc5-hkmw-3qf9
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1984
reference_id
reference_type
scores
0
value 0.00904
scoring_system epss
scoring_elements 0.75738
published_at 2026-04-21T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75654
published_at 2026-04-01T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-02T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-04T12:55:00Z
4
value 0.00904
scoring_system epss
scoring_elements 0.75666
published_at 2026-04-07T12:55:00Z
5
value 0.00904
scoring_system epss
scoring_elements 0.75701
published_at 2026-04-08T12:55:00Z
6
value 0.00904
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-09T12:55:00Z
7
value 0.00904
scoring_system epss
scoring_elements 0.75736
published_at 2026-04-11T12:55:00Z
8
value 0.00904
scoring_system epss
scoring_elements 0.75717
published_at 2026-04-12T12:55:00Z
9
value 0.00904
scoring_system epss
scoring_elements 0.7571
published_at 2026-04-13T12:55:00Z
10
value 0.00904
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-16T12:55:00Z
11
value 0.00904
scoring_system epss
scoring_elements 0.75751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1984
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
7
reference_url http://www.debian.org/security/2013/dsa-2683
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2683
8
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
9
reference_url http://www.ubuntu.com/usn/USN-1859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1859-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959049
reference_id 959049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959049
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1984
reference_id CVE-2013-1984
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1984
22
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
23
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
24
reference_url https://usn.ubuntu.com/1859-1/
reference_id USN-1859-1
reference_type
scores
url https://usn.ubuntu.com/1859-1/
fixed_packages
aliases CVE-2013-1984
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-euc5-hkmw-3qf9
12
url VCID-h4tq-pktb-mqdt
vulnerability_id VCID-h4tq-pktb-mqdt
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1995
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74509
published_at 2026-04-21T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.74423
published_at 2026-04-01T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-02T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.74454
published_at 2026-04-04T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-07T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.74461
published_at 2026-04-08T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74478
published_at 2026-04-09T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.745
published_at 2026-04-11T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.74481
published_at 2026-04-12T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74472
published_at 2026-04-13T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.7451
published_at 2026-04-16T12:55:00Z
11
value 0.00826
scoring_system epss
scoring_elements 0.74517
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1995
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
7
reference_url http://www.debian.org/security/2013/dsa-2683
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2683
8
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
9
reference_url http://www.securityfocus.com/bid/60124
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60124
10
reference_url http://www.ubuntu.com/usn/USN-1859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1859-1
11
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960357
reference_id 960357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960357
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1995
reference_id CVE-2013-1995
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1995
23
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
24
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
25
reference_url https://usn.ubuntu.com/1859-1/
reference_id USN-1859-1
reference_type
scores
url https://usn.ubuntu.com/1859-1/
fixed_packages
aliases CVE-2013-1995
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4tq-pktb-mqdt
13
url VCID-hnx7-1muu-zqef
vulnerability_id VCID-hnx7-1muu-zqef
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1992
reference_id
reference_type
scores
0
value 0.00974
scoring_system epss
scoring_elements 0.76716
published_at 2026-04-21T12:55:00Z
1
value 0.00974
scoring_system epss
scoring_elements 0.76625
published_at 2026-04-01T12:55:00Z
2
value 0.00974
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-02T12:55:00Z
3
value 0.00974
scoring_system epss
scoring_elements 0.76657
published_at 2026-04-04T12:55:00Z
4
value 0.00974
scoring_system epss
scoring_elements 0.76638
published_at 2026-04-07T12:55:00Z
5
value 0.00974
scoring_system epss
scoring_elements 0.7667
published_at 2026-04-08T12:55:00Z
6
value 0.00974
scoring_system epss
scoring_elements 0.76682
published_at 2026-04-09T12:55:00Z
7
value 0.00974
scoring_system epss
scoring_elements 0.76709
published_at 2026-04-11T12:55:00Z
8
value 0.00974
scoring_system epss
scoring_elements 0.76689
published_at 2026-04-12T12:55:00Z
9
value 0.00974
scoring_system epss
scoring_elements 0.76681
published_at 2026-04-13T12:55:00Z
10
value 0.00974
scoring_system epss
scoring_elements 0.76722
published_at 2026-04-16T12:55:00Z
11
value 0.00974
scoring_system epss
scoring_elements 0.76727
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1992
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992
5
reference_url http://www.debian.org/security/2013/dsa-2673
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2673
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1852-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1852-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959074
reference_id 959074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959074
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1992
reference_id CVE-2013-1992
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1992
16
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
17
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
18
reference_url https://usn.ubuntu.com/1852-1/
reference_id USN-1852-1
reference_type
scores
url https://usn.ubuntu.com/1852-1/
fixed_packages
aliases CVE-2013-1992
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnx7-1muu-zqef
14
url VCID-j2u9-4cr6-yqcv
vulnerability_id VCID-j2u9-4cr6-yqcv
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
reference_id
reference_type
scores
0
value 0.00894
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-18T12:55:00Z
1
value 0.00894
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-01T12:55:00Z
2
value 0.00894
scoring_system epss
scoring_elements 0.75526
published_at 2026-04-02T12:55:00Z
3
value 0.00894
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-04T12:55:00Z
4
value 0.00894
scoring_system epss
scoring_elements 0.75536
published_at 2026-04-07T12:55:00Z
5
value 0.00894
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-08T12:55:00Z
6
value 0.00894
scoring_system epss
scoring_elements 0.75588
published_at 2026-04-13T12:55:00Z
7
value 0.00894
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-21T12:55:00Z
8
value 0.00894
scoring_system epss
scoring_elements 0.75595
published_at 2026-04-12T12:55:00Z
9
value 0.00894
scoring_system epss
scoring_elements 0.75625
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.securityfocus.com/bid/60120
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60120
9
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959040
reference_id 959040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959040
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
reference_id CVE-2013-1981
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1981
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
aliases CVE-2013-1981
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv
15
url VCID-jy2n-5vjx-k7c1
vulnerability_id VCID-jy2n-5vjx-k7c1
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2002
reference_id
reference_type
scores
0
value 0.00902
scoring_system epss
scoring_elements 0.75714
published_at 2026-04-21T12:55:00Z
1
value 0.00902
scoring_system epss
scoring_elements 0.75629
published_at 2026-04-01T12:55:00Z
2
value 0.00902
scoring_system epss
scoring_elements 0.75631
published_at 2026-04-02T12:55:00Z
3
value 0.00902
scoring_system epss
scoring_elements 0.75662
published_at 2026-04-04T12:55:00Z
4
value 0.00902
scoring_system epss
scoring_elements 0.75642
published_at 2026-04-07T12:55:00Z
5
value 0.00902
scoring_system epss
scoring_elements 0.75676
published_at 2026-04-08T12:55:00Z
6
value 0.00902
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-09T12:55:00Z
7
value 0.00902
scoring_system epss
scoring_elements 0.75711
published_at 2026-04-11T12:55:00Z
8
value 0.00902
scoring_system epss
scoring_elements 0.75692
published_at 2026-04-12T12:55:00Z
9
value 0.00902
scoring_system epss
scoring_elements 0.75686
published_at 2026-04-13T12:55:00Z
10
value 0.00902
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-16T12:55:00Z
11
value 0.00902
scoring_system epss
scoring_elements 0.75727
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2002
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
6
reference_url http://www.debian.org/security/2013/dsa-2680
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2680
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.securityfocus.com/bid/60137
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60137
9
reference_url http://www.ubuntu.com/usn/USN-1865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1865-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960352
reference_id 960352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960352
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2002
reference_id CVE-2013-2002
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2002
23
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
24
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
25
reference_url https://usn.ubuntu.com/1865-1/
reference_id USN-1865-1
reference_type
scores
url https://usn.ubuntu.com/1865-1/
fixed_packages
aliases CVE-2013-2002
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jy2n-5vjx-k7c1
16
url VCID-jz8t-44r3-3yc5
vulnerability_id VCID-jz8t-44r3-3yc5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
reference_id
reference_type
scores
0
value 0.00727
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-21T12:55:00Z
1
value 0.00727
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-01T12:55:00Z
2
value 0.00727
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-02T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72582
published_at 2026-04-04T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72559
published_at 2026-04-07T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72597
published_at 2026-04-08T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-09T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-11T12:55:00Z
8
value 0.00727
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-12T12:55:00Z
9
value 0.00727
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-13T12:55:00Z
10
value 0.00727
scoring_system epss
scoring_elements 0.72647
published_at 2026-04-16T12:55:00Z
11
value 0.00727
scoring_system epss
scoring_elements 0.72657
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1997
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
6
reference_url http://www.debian.org/security/2013/dsa-2693
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2693
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1854-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1854-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960345
reference_id 960345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960345
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
reference_id CVE-2013-1997
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1997
14
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
15
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
16
reference_url https://usn.ubuntu.com/1854-1/
reference_id USN-1854-1
reference_type
scores
url https://usn.ubuntu.com/1854-1/
fixed_packages
aliases CVE-2013-1997
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5
17
url VCID-kdu9-jdub-myhy
vulnerability_id VCID-kdu9-jdub-myhy
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2003
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75683
published_at 2026-04-21T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75598
published_at 2026-04-01T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.756
published_at 2026-04-02T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.7563
published_at 2026-04-04T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.7561
published_at 2026-04-07T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75645
published_at 2026-04-08T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-13T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.7568
published_at 2026-04-11T12:55:00Z
8
value 0.00899
scoring_system epss
scoring_elements 0.75662
published_at 2026-04-12T12:55:00Z
9
value 0.00899
scoring_system epss
scoring_elements 0.75694
published_at 2026-04-16T12:55:00Z
10
value 0.00899
scoring_system epss
scoring_elements 0.75697
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2003
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
4
reference_url http://www.debian.org/security/2013/dsa-2681
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2681
5
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
6
reference_url http://www.securityfocus.com/bid/60121
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60121
7
reference_url http://www.ubuntu.com/usn/USN-1856-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1856-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959077
reference_id 959077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959077
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2003
reference_id CVE-2013-2003
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2003
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1856-1/
reference_id USN-1856-1
reference_type
scores
url https://usn.ubuntu.com/1856-1/
fixed_packages
aliases CVE-2013-2003
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdu9-jdub-myhy
18
url VCID-kz7s-r6ad-qfa5
vulnerability_id VCID-kz7s-r6ad-qfa5
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2063
reference_id
reference_type
scores
0
value 0.00974
scoring_system epss
scoring_elements 0.76716
published_at 2026-04-21T12:55:00Z
1
value 0.00974
scoring_system epss
scoring_elements 0.76625
published_at 2026-04-01T12:55:00Z
2
value 0.00974
scoring_system epss
scoring_elements 0.76628
published_at 2026-04-02T12:55:00Z
3
value 0.00974
scoring_system epss
scoring_elements 0.76657
published_at 2026-04-04T12:55:00Z
4
value 0.00974
scoring_system epss
scoring_elements 0.76638
published_at 2026-04-07T12:55:00Z
5
value 0.00974
scoring_system epss
scoring_elements 0.7667
published_at 2026-04-08T12:55:00Z
6
value 0.00974
scoring_system epss
scoring_elements 0.76682
published_at 2026-04-09T12:55:00Z
7
value 0.00974
scoring_system epss
scoring_elements 0.76709
published_at 2026-04-11T12:55:00Z
8
value 0.00974
scoring_system epss
scoring_elements 0.76689
published_at 2026-04-12T12:55:00Z
9
value 0.00974
scoring_system epss
scoring_elements 0.76681
published_at 2026-04-13T12:55:00Z
10
value 0.00974
scoring_system epss
scoring_elements 0.76722
published_at 2026-04-16T12:55:00Z
11
value 0.00974
scoring_system epss
scoring_elements 0.76727
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2063
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
5
reference_url http://www.debian.org/security/2013/dsa-2689
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2689
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1866-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960366
reference_id 960366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960366
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2063
reference_id CVE-2013-2063
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2063
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
20
reference_url https://usn.ubuntu.com/1866-1/
reference_id USN-1866-1
reference_type
scores
url https://usn.ubuntu.com/1866-1/
fixed_packages
aliases CVE-2013-2063
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kz7s-r6ad-qfa5
19
url VCID-pcvu-rz99-wbec
vulnerability_id VCID-pcvu-rz99-wbec
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2000
reference_id
reference_type
scores
0
value 0.00727
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-21T12:55:00Z
1
value 0.00727
scoring_system epss
scoring_elements 0.72558
published_at 2026-04-01T12:55:00Z
2
value 0.00727
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-02T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72582
published_at 2026-04-04T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72559
published_at 2026-04-07T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72597
published_at 2026-04-08T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72609
published_at 2026-04-09T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72633
published_at 2026-04-11T12:55:00Z
8
value 0.00727
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-12T12:55:00Z
9
value 0.00727
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-13T12:55:00Z
10
value 0.00727
scoring_system epss
scoring_elements 0.72647
published_at 2026-04-16T12:55:00Z
11
value 0.00727
scoring_system epss
scoring_elements 0.72657
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2000
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
5
reference_url http://www.debian.org/security/2013/dsa-2690
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2690
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1869-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1869-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960349
reference_id 960349
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960349
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2000
reference_id CVE-2013-2000
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2000
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1869-1/
reference_id USN-1869-1
reference_type
scores
url https://usn.ubuntu.com/1869-1/
fixed_packages
aliases CVE-2013-2000
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pcvu-rz99-wbec
20
url VCID-pkva-3f16-e7b4
vulnerability_id VCID-pkva-3f16-e7b4
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2005
reference_id
reference_type
scores
0
value 0.00679
scoring_system epss
scoring_elements 0.71572
published_at 2026-04-21T12:55:00Z
1
value 0.00679
scoring_system epss
scoring_elements 0.71504
published_at 2026-04-01T12:55:00Z
2
value 0.00679
scoring_system epss
scoring_elements 0.7151
published_at 2026-04-02T12:55:00Z
3
value 0.00679
scoring_system epss
scoring_elements 0.71527
published_at 2026-04-04T12:55:00Z
4
value 0.00679
scoring_system epss
scoring_elements 0.71501
published_at 2026-04-07T12:55:00Z
5
value 0.00679
scoring_system epss
scoring_elements 0.71541
published_at 2026-04-08T12:55:00Z
6
value 0.00679
scoring_system epss
scoring_elements 0.71552
published_at 2026-04-09T12:55:00Z
7
value 0.00679
scoring_system epss
scoring_elements 0.71575
published_at 2026-04-11T12:55:00Z
8
value 0.00679
scoring_system epss
scoring_elements 0.7156
published_at 2026-04-12T12:55:00Z
9
value 0.00679
scoring_system epss
scoring_elements 0.71542
published_at 2026-04-13T12:55:00Z
10
value 0.00679
scoring_system epss
scoring_elements 0.71588
published_at 2026-04-16T12:55:00Z
11
value 0.00679
scoring_system epss
scoring_elements 0.71593
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
6
reference_url http://www.debian.org/security/2013/dsa-2680
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2680
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.securityfocus.com/bid/60133
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60133
9
reference_url http://www.ubuntu.com/usn/USN-1865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1865-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959108
reference_id 959108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959108
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2005
reference_id CVE-2013-2005
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2005
23
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
24
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
25
reference_url https://usn.ubuntu.com/1865-1/
reference_id USN-1865-1
reference_type
scores
url https://usn.ubuntu.com/1865-1/
fixed_packages
aliases CVE-2013-2005
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pkva-3f16-e7b4
21
url VCID-qk9r-eew2-ebdt
vulnerability_id VCID-qk9r-eew2-ebdt
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1983
reference_id
reference_type
scores
0
value 0.00909
scoring_system epss
scoring_elements 0.75828
published_at 2026-04-21T12:55:00Z
1
value 0.00909
scoring_system epss
scoring_elements 0.75745
published_at 2026-04-01T12:55:00Z
2
value 0.00909
scoring_system epss
scoring_elements 0.75747
published_at 2026-04-02T12:55:00Z
3
value 0.00909
scoring_system epss
scoring_elements 0.75779
published_at 2026-04-04T12:55:00Z
4
value 0.00909
scoring_system epss
scoring_elements 0.75757
published_at 2026-04-07T12:55:00Z
5
value 0.00909
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-08T12:55:00Z
6
value 0.00909
scoring_system epss
scoring_elements 0.75803
published_at 2026-04-09T12:55:00Z
7
value 0.00909
scoring_system epss
scoring_elements 0.75827
published_at 2026-04-11T12:55:00Z
8
value 0.00909
scoring_system epss
scoring_elements 0.75807
published_at 2026-04-12T12:55:00Z
9
value 0.00909
scoring_system epss
scoring_elements 0.75801
published_at 2026-04-13T12:55:00Z
10
value 0.00909
scoring_system epss
scoring_elements 0.75839
published_at 2026-04-16T12:55:00Z
11
value 0.00909
scoring_system epss
scoring_elements 0.75843
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1983
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983
5
reference_url http://www.debian.org/security/2013/dsa-2676
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2676
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1858-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1858-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959048
reference_id 959048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959048
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1983
reference_id CVE-2013-1983
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1983
18
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
19
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
20
reference_url https://usn.ubuntu.com/1858-1/
reference_id USN-1858-1
reference_type
scores
url https://usn.ubuntu.com/1858-1/
fixed_packages
aliases CVE-2013-1983
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qk9r-eew2-ebdt
22
url VCID-qtg2-2uh4-3kgz
vulnerability_id VCID-qtg2-2uh4-3kgz
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1982
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.6557
published_at 2026-04-21T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65454
published_at 2026-04-01T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65503
published_at 2026-04-02T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65531
published_at 2026-04-04T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65495
published_at 2026-04-07T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.65548
published_at 2026-04-08T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65559
published_at 2026-04-09T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65578
published_at 2026-04-11T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65565
published_at 2026-04-12T12:55:00Z
9
value 0.00489
scoring_system epss
scoring_elements 0.65537
published_at 2026-04-13T12:55:00Z
10
value 0.00489
scoring_system epss
scoring_elements 0.65573
published_at 2026-04-16T12:55:00Z
11
value 0.00489
scoring_system epss
scoring_elements 0.65585
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982
4
reference_url http://www.debian.org/security/2013/dsa-2682
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2682
5
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
6
reference_url http://www.ubuntu.com/usn/USN-1857-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1857-1
7
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959046
reference_id 959046
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959046
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1982
reference_id CVE-2013-1982
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1982
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1857-1/
reference_id USN-1857-1
reference_type
scores
url https://usn.ubuntu.com/1857-1/
fixed_packages
aliases CVE-2013-1982
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg2-2uh4-3kgz
23
url VCID-sxvx-ndye-sbh3
vulnerability_id VCID-sxvx-ndye-sbh3
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1998
reference_id
reference_type
scores
0
value 0.00896
scoring_system epss
scoring_elements 0.7564
published_at 2026-04-21T12:55:00Z
1
value 0.00896
scoring_system epss
scoring_elements 0.75556
published_at 2026-04-01T12:55:00Z
2
value 0.00896
scoring_system epss
scoring_elements 0.75558
published_at 2026-04-02T12:55:00Z
3
value 0.00896
scoring_system epss
scoring_elements 0.75589
published_at 2026-04-04T12:55:00Z
4
value 0.00896
scoring_system epss
scoring_elements 0.75569
published_at 2026-04-07T12:55:00Z
5
value 0.00896
scoring_system epss
scoring_elements 0.75603
published_at 2026-04-08T12:55:00Z
6
value 0.00896
scoring_system epss
scoring_elements 0.75614
published_at 2026-04-09T12:55:00Z
7
value 0.00896
scoring_system epss
scoring_elements 0.75638
published_at 2026-04-11T12:55:00Z
8
value 0.00896
scoring_system epss
scoring_elements 0.7562
published_at 2026-04-12T12:55:00Z
9
value 0.00896
scoring_system epss
scoring_elements 0.75613
published_at 2026-04-13T12:55:00Z
10
value 0.00896
scoring_system epss
scoring_elements 0.75651
published_at 2026-04-16T12:55:00Z
11
value 0.00896
scoring_system epss
scoring_elements 0.75654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1998
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
7
reference_url http://www.debian.org/security/2013/dsa-2683
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2683
8
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
9
reference_url http://www.securityfocus.com/bid/60127
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60127
10
reference_url http://www.ubuntu.com/usn/USN-1859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1859-1
11
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960346
reference_id 960346
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960346
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1998
reference_id CVE-2013-1998
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1998
23
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
24
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
25
reference_url https://usn.ubuntu.com/1859-1/
reference_id USN-1859-1
reference_type
scores
url https://usn.ubuntu.com/1859-1/
fixed_packages
aliases CVE-2013-1998
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxvx-ndye-sbh3
24
url VCID-wg33-s17g-xkf2
vulnerability_id VCID-wg33-s17g-xkf2
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2064
reference_id
reference_type
scores
0
value 0.00943
scoring_system epss
scoring_elements 0.76313
published_at 2026-04-21T12:55:00Z
1
value 0.00943
scoring_system epss
scoring_elements 0.76223
published_at 2026-04-01T12:55:00Z
2
value 0.00943
scoring_system epss
scoring_elements 0.76227
published_at 2026-04-02T12:55:00Z
3
value 0.00943
scoring_system epss
scoring_elements 0.76258
published_at 2026-04-04T12:55:00Z
4
value 0.00943
scoring_system epss
scoring_elements 0.76238
published_at 2026-04-07T12:55:00Z
5
value 0.00943
scoring_system epss
scoring_elements 0.76271
published_at 2026-04-08T12:55:00Z
6
value 0.00943
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-13T12:55:00Z
7
value 0.00943
scoring_system epss
scoring_elements 0.76311
published_at 2026-04-11T12:55:00Z
8
value 0.00943
scoring_system epss
scoring_elements 0.76288
published_at 2026-04-12T12:55:00Z
9
value 0.00943
scoring_system epss
scoring_elements 0.76325
published_at 2026-04-16T12:55:00Z
10
value 0.00943
scoring_system epss
scoring_elements 0.76329
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2064
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064
5
reference_url http://www.debian.org/security/2013/dsa-2686
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2686
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
8
reference_url http://www.securityfocus.com/bid/60148
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60148
9
reference_url http://www.ubuntu.com/usn/USN-1855-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1855-1
10
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960367
reference_id 960367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960367
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2064
reference_id CVE-2013-2064
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2064
37
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
38
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
39
reference_url https://usn.ubuntu.com/1855-1/
reference_id USN-1855-1
reference_type
scores
url https://usn.ubuntu.com/1855-1/
fixed_packages
aliases CVE-2013-2064
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wg33-s17g-xkf2
25
url VCID-xq2n-wy4g-dkaz
vulnerability_id VCID-xq2n-wy4g-dkaz
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1985
reference_id
reference_type
scores
0
value 0.00836
scoring_system epss
scoring_elements 0.74665
published_at 2026-04-21T12:55:00Z
1
value 0.00836
scoring_system epss
scoring_elements 0.74583
published_at 2026-04-01T12:55:00Z
2
value 0.00836
scoring_system epss
scoring_elements 0.74587
published_at 2026-04-02T12:55:00Z
3
value 0.00836
scoring_system epss
scoring_elements 0.74614
published_at 2026-04-04T12:55:00Z
4
value 0.00836
scoring_system epss
scoring_elements 0.74588
published_at 2026-04-07T12:55:00Z
5
value 0.00836
scoring_system epss
scoring_elements 0.7462
published_at 2026-04-08T12:55:00Z
6
value 0.00836
scoring_system epss
scoring_elements 0.74635
published_at 2026-04-09T12:55:00Z
7
value 0.00836
scoring_system epss
scoring_elements 0.74658
published_at 2026-04-11T12:55:00Z
8
value 0.00836
scoring_system epss
scoring_elements 0.74638
published_at 2026-04-12T12:55:00Z
9
value 0.00836
scoring_system epss
scoring_elements 0.74629
published_at 2026-04-13T12:55:00Z
10
value 0.00836
scoring_system epss
scoring_elements 0.74666
published_at 2026-04-16T12:55:00Z
11
value 0.00836
scoring_system epss
scoring_elements 0.74673
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1985
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985
5
reference_url http://www.debian.org/security/2013/dsa-2691
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2691
6
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
7
reference_url http://www.ubuntu.com/usn/USN-1860-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1860-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959056
reference_id 959056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959056
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1985
reference_id CVE-2013-1985
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1985
17
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
18
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
19
reference_url https://usn.ubuntu.com/1860-1/
reference_id USN-1860-1
reference_type
scores
url https://usn.ubuntu.com/1860-1/
fixed_packages
aliases CVE-2013-1985
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq2n-wy4g-dkaz
26
url VCID-z7gv-ayeg-s3g1
vulnerability_id VCID-z7gv-ayeg-s3g1
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2066
reference_id
reference_type
scores
0
value 0.00906
scoring_system epss
scoring_elements 0.75774
published_at 2026-04-21T12:55:00Z
1
value 0.00906
scoring_system epss
scoring_elements 0.75691
published_at 2026-04-01T12:55:00Z
2
value 0.00906
scoring_system epss
scoring_elements 0.75693
published_at 2026-04-02T12:55:00Z
3
value 0.00906
scoring_system epss
scoring_elements 0.75724
published_at 2026-04-04T12:55:00Z
4
value 0.00906
scoring_system epss
scoring_elements 0.75703
published_at 2026-04-07T12:55:00Z
5
value 0.00906
scoring_system epss
scoring_elements 0.75737
published_at 2026-04-08T12:55:00Z
6
value 0.00906
scoring_system epss
scoring_elements 0.75749
published_at 2026-04-09T12:55:00Z
7
value 0.00906
scoring_system epss
scoring_elements 0.75772
published_at 2026-04-11T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75754
published_at 2026-04-12T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75748
published_at 2026-04-13T12:55:00Z
10
value 0.00906
scoring_system epss
scoring_elements 0.75785
published_at 2026-04-16T12:55:00Z
11
value 0.00906
scoring_system epss
scoring_elements 0.75789
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2066
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
6
reference_url http://www.debian.org/security/2013/dsa-2674
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2674
7
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
8
reference_url http://www.ubuntu.com/usn/USN-1867-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1867-1
9
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=960369
reference_id 960369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=960369
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2066
reference_id CVE-2013-2066
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2066
24
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
25
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
26
reference_url https://usn.ubuntu.com/1867-1/
reference_id USN-1867-1
reference_type
scores
url https://usn.ubuntu.com/1867-1/
fixed_packages
aliases CVE-2013-2066
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7gv-ayeg-s3g1
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libdmx@1.1.3-3%3Farch=el6