Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/124047?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/124047?format=api", "purl": "pkg:rpm/redhat/libXt@1.1.4-6.1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "libXt", "version": "1.1.4-6.1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35532?format=api", "vulnerability_id": "VCID-1ngj-ep8k-3bbc", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75789", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2675" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1868-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1868-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960347", "reference_id": "960347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960347" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1999", "reference_id": "CVE-2013-1999", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1999" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1868-1/", "reference_id": "USN-1868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1868-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1999" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ngj-ep8k-3bbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35516?format=api", "vulnerability_id": "VCID-3ap5-ppvg-juc1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1988", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.7451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74517", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2688", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2688" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1864-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1864-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959066", "reference_id": "959066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959066" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1988", "reference_id": "CVE-2013-1988", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1988" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1864-1/", "reference_id": "USN-1864-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1864-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1988" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ap5-ppvg-juc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35513?format=api", "vulnerability_id": "VCID-3cdg-93ke-8fa9", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1986", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2684" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1862-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1862-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959059", "reference_id": "959059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959059" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1986", "reference_id": "CVE-2013-1986", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1986" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1862-1/", "reference_id": "USN-1862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1862-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1986" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3cdg-93ke-8fa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35519?format=api", "vulnerability_id": "VCID-5323-m7nb-6yax", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2690" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1869-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1869-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959072", "reference_id": "959072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959072" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1991", "reference_id": "CVE-2013-1991", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1991" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1869-1/", "reference_id": "USN-1869-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1869-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1991" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5323-m7nb-6yax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35518?format=api", "vulnerability_id": "VCID-8aha-x3r3-uqen", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2675" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1868-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1868-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959070", "reference_id": "959070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1990", "reference_id": "CVE-2013-1990", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1990" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1868-1/", "reference_id": "USN-1868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1868-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1990" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8aha-x3r3-uqen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35537?format=api", "vulnerability_id": "VCID-9jjr-recn-f3a2", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78507", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78438", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78469", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78453", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78479", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78491", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78511", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2692" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1870-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1870-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960350", "reference_id": "960350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960350" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2001", "reference_id": "CVE-2013-2001", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2001" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1870-1/", "reference_id": "USN-1870-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1870-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2001" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jjr-recn-f3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35515?format=api", "vulnerability_id": "VCID-ckk4-x9aw-8qh7", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1987", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2677", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2677" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60132", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60132" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1863-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1863-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959061", "reference_id": "959061", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959061" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1987", "reference_id": "CVE-2013-1987", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1987" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1863-1/", "reference_id": "USN-1863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1863-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1987" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckk4-x9aw-8qh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35548?format=api", "vulnerability_id": "VCID-cv5u-c5s5-fqfp", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67764", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67848", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67871", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67835", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67883", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2062" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2685" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1861-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1861-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960362", "reference_id": "960362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2062", "reference_id": "CVE-2013-2062", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2062" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1861-1/", "reference_id": "USN-1861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1861-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2062" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cv5u-c5s5-fqfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35545?format=api", "vulnerability_id": "VCID-dcgs-qd3h-k7gq", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60313", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60286", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60306", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112", "reference_id": "959112", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004", "reference_id": "CVE-2013-2004", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2004" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35517?format=api", "vulnerability_id": "VCID-dn3z-f522-hucu", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2674" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1867-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959068", "reference_id": "959068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959068" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1989", "reference_id": "CVE-2013-1989", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1989" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1867-1/", "reference_id": "USN-1867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1867-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1989" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3z-f522-hucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=api", "vulnerability_id": "VCID-e19k-nptv-ffgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83061", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83077", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83091", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.8309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83166", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01877", "scoring_system": "epss", "scoring_elements": "0.83169", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943", "reference_id": "1209943", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/2568-1/", "reference_id": "USN-2568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2568-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7439" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35501?format=api", "vulnerability_id": "VCID-euc5-hkmw-3qf9", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959049", "reference_id": "959049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959049" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1984", "reference_id": "CVE-2013-1984", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1984" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1984" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-euc5-hkmw-3qf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35523?format=api", "vulnerability_id": "VCID-h4tq-pktb-mqdt", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.7451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74517", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60124" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960357", "reference_id": "960357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960357" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1995", "reference_id": "CVE-2013-1995", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1995" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1995" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h4tq-pktb-mqdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35520?format=api", "vulnerability_id": "VCID-hnx7-1muu-zqef", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1992", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76716", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2673", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2673" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1852-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1852-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959074", "reference_id": "959074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959074" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1992", "reference_id": "CVE-2013-1992", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1992" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1852-1/", "reference_id": "USN-1852-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1852-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1992" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnx7-1muu-zqef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35498?format=api", "vulnerability_id": "VCID-j2u9-4cr6-yqcv", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60120" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040", "reference_id": "959040", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981", "reference_id": "CVE-2013-1981", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1981" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35541?format=api", "vulnerability_id": "VCID-jy2n-5vjx-k7c1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75692", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2680", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2680" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60137" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1865-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1865-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960352", "reference_id": "960352", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2002", "reference_id": "CVE-2013-2002", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2002" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1865-1/", "reference_id": "USN-1865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1865-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2002" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jy2n-5vjx-k7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35527?format=api", "vulnerability_id": "VCID-jz8t-44r3-3yc5", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72657", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345", "reference_id": "960345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997", "reference_id": "CVE-2013-1997", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1997" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35543?format=api", "vulnerability_id": "VCID-kdu9-jdub-myhy", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2003", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75683", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7563", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75694", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75697", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2681", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2681" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60121" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1856-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1856-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959077", "reference_id": "959077", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959077" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2003", "reference_id": "CVE-2013-2003", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2003" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1856-1/", "reference_id": "USN-1856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1856-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2003" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdu9-jdub-myhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35549?format=api", "vulnerability_id": "VCID-kz7s-r6ad-qfa5", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2063", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76716", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2063" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2689" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1866-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1866-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960366", "reference_id": "960366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960366" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2063", "reference_id": "CVE-2013-2063", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2063" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1866-1/", "reference_id": "USN-1866-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1866-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2063" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kz7s-r6ad-qfa5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35535?format=api", "vulnerability_id": "VCID-pcvu-rz99-wbec", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72657", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2690" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1869-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1869-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960349", "reference_id": "960349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960349" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2000", "reference_id": "CVE-2013-2000", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2000" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1869-1/", "reference_id": "USN-1869-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1869-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2000" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcvu-rz99-wbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35546?format=api", "vulnerability_id": "VCID-pkva-3f16-e7b4", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71504", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7151", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7156", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71588", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71593", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2680", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2680" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60133" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1865-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1865-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959108", "reference_id": "959108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959108" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2005", "reference_id": "CVE-2013-2005", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2005" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1865-1/", "reference_id": "USN-1865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1865-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2005" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkva-3f16-e7b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35500?format=api", "vulnerability_id": "VCID-qk9r-eew2-ebdt", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75828", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75779", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75807", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75801", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75839", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75843", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2676", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2676" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1858-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1858-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959048", "reference_id": "959048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959048" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1983", "reference_id": "CVE-2013-1983", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1983" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1858-1/", "reference_id": "USN-1858-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1858-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1983" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qk9r-eew2-ebdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35499?format=api", "vulnerability_id": "VCID-qtg2-2uh4-3kgz", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.6557", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65495", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65573", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65585", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2682", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2682" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1857-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1857-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959046", "reference_id": "959046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959046" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1982", "reference_id": "CVE-2013-1982", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1982" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1857-1/", "reference_id": "USN-1857-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1857-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1982" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg2-2uh4-3kgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35528?format=api", "vulnerability_id": "VCID-sxvx-ndye-sbh3", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.7564", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75589", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75603", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.7562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60127" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960346", "reference_id": "960346", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960346" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1998", "reference_id": "CVE-2013-1998", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1998" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1998" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sxvx-ndye-sbh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35550?format=api", "vulnerability_id": "VCID-wg33-s17g-xkf2", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2064", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76223", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76238", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76271", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76284", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76311", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76325", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2686", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2686" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.securityfocus.com/bid/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60148" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1855-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960367", "reference_id": "960367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960367" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2064", "reference_id": "CVE-2013-2064", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2064" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1855-1/", "reference_id": "USN-1855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1855-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2064" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wg33-s17g-xkf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35506?format=api", "vulnerability_id": "VCID-xq2n-wy4g-dkaz", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74665", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74583", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74587", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.7462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74673", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2691" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1860-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959056", "reference_id": "959056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959056" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1985", "reference_id": "CVE-2013-1985", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1985" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1860-1/", "reference_id": "USN-1860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1860-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-1985" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq2n-wy4g-dkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35552?format=api", "vulnerability_id": "VCID-z7gv-ayeg-s3g1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75789", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2674" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1867-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960369", "reference_id": "960369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960369" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2066", "reference_id": "CVE-2013-2066", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2066" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1867-1/", "reference_id": "USN-1867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1867-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-2066" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7gv-ayeg-s3g1" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libXt@1.1.4-6.1%3Farch=el6" }