Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libxcursor@1:1.1.10-2%2Bsqueeze1
Typedeb
Namespacedebian
Namelibxcursor
Version1:1.1.10-2+squeeze1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.1.15-2
Latest_non_vulnerable_version1:1.1.15-2
Affected_by_vulnerabilities
0
url VCID-kdu9-jdub-myhy
vulnerability_id VCID-kdu9-jdub-myhy
summary
Multiple vulnerabilities have been found in X.Org X Server,
    allowing attackers to execute arbitrary code or cause a Denial of Service
    condition.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2003
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75683
published_at 2026-04-21T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75598
published_at 2026-04-01T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.756
published_at 2026-04-02T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.7563
published_at 2026-04-04T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.7561
published_at 2026-04-07T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75645
published_at 2026-04-08T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-13T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.7568
published_at 2026-04-11T12:55:00Z
8
value 0.00899
scoring_system epss
scoring_elements 0.75662
published_at 2026-04-12T12:55:00Z
9
value 0.00899
scoring_system epss
scoring_elements 0.75694
published_at 2026-04-16T12:55:00Z
10
value 0.00899
scoring_system epss
scoring_elements 0.75697
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2003
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
4
reference_url http://www.debian.org/security/2013/dsa-2681
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2681
5
reference_url http://www.openwall.com/lists/oss-security/2013/05/23/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/23/3
6
reference_url http://www.securityfocus.com/bid/60121
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60121
7
reference_url http://www.ubuntu.com/usn/USN-1856-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1856-1
8
reference_url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
reference_id
reference_type
scores
url http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=959077
reference_id 959077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=959077
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2003
reference_id CVE-2013-2003
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2003
19
reference_url https://security.gentoo.org/glsa/201405-07
reference_id GLSA-201405-07
reference_type
scores
url https://security.gentoo.org/glsa/201405-07
20
reference_url https://access.redhat.com/errata/RHSA-2014:1436
reference_id RHSA-2014:1436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1436
21
reference_url https://usn.ubuntu.com/1856-1/
reference_id USN-1856-1
reference_type
scores
url https://usn.ubuntu.com/1856-1/
fixed_packages
0
url pkg:deb/debian/libxcursor@1:1.1.13-1%2Bdeb7u1
purl pkg:deb/debian/libxcursor@1:1.1.13-1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tt61-tq28-4ucw
1
vulnerability VCID-zyj3-3eg1-mqez
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.13-1%252Bdeb7u1
aliases CVE-2013-2003
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdu9-jdub-myhy
1
url VCID-tt61-tq28-4ucw
vulnerability_id VCID-tt61-tq28-4ucw
summary
A vulnerability in LibXcursor might allow remote attackers to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16612.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16612
reference_id
reference_type
scores
0
value 0.03557
scoring_system epss
scoring_elements 0.87646
published_at 2026-04-01T12:55:00Z
1
value 0.03557
scoring_system epss
scoring_elements 0.87712
published_at 2026-04-21T12:55:00Z
2
value 0.03557
scoring_system epss
scoring_elements 0.87691
published_at 2026-04-08T12:55:00Z
3
value 0.03557
scoring_system epss
scoring_elements 0.87698
published_at 2026-04-09T12:55:00Z
4
value 0.03557
scoring_system epss
scoring_elements 0.87709
published_at 2026-04-11T12:55:00Z
5
value 0.03557
scoring_system epss
scoring_elements 0.87702
published_at 2026-04-12T12:55:00Z
6
value 0.03557
scoring_system epss
scoring_elements 0.877
published_at 2026-04-13T12:55:00Z
7
value 0.03557
scoring_system epss
scoring_elements 0.87715
published_at 2026-04-18T12:55:00Z
8
value 0.03557
scoring_system epss
scoring_elements 0.87657
published_at 2026-04-02T12:55:00Z
9
value 0.03557
scoring_system epss
scoring_elements 0.87669
published_at 2026-04-04T12:55:00Z
10
value 0.03557
scoring_system epss
scoring_elements 0.8767
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16612
2
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1065386
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1065386
3
reference_url https://cgit.freedesktop.org/wayland/wayland/commit/?id=5d201df72f3d4f4cb8b8f75f980169b03507da38
reference_id
reference_type
scores
url https://cgit.freedesktop.org/wayland/wayland/commit/?id=5d201df72f3d4f4cb8b8f75f980169b03507da38
4
reference_url https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8
reference_id
reference_type
scores
url https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612
6
reference_url http://security.cucumberlinux.com/security/details.php?id=156
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=156
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2017/12/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/12/msg00002.html
9
reference_url https://lists.freedesktop.org/archives/wayland-devel/2017-November/035979.html
reference_id
reference_type
scores
url https://lists.freedesktop.org/archives/wayland-devel/2017-November/035979.html
10
reference_url https://marc.info/?l=freedesktop-xorg-announce&m=151188036018262&w=2
reference_id
reference_type
scores
url https://marc.info/?l=freedesktop-xorg-announce&m=151188036018262&w=2
11
reference_url https://www.debian.org/security/2017/dsa-4059
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4059
12
reference_url http://www.openwall.com/lists/oss-security/2017/11/28/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/11/28/6
13
reference_url http://www.ubuntu.com/usn/USN-3501-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3501-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518475
reference_id 1518475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518475
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883792
reference_id 883792
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883792
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889681
reference_id 889681
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889681
17
reference_url https://security.archlinux.org/ASA-201711-41
reference_id ASA-201711-41
reference_type
scores
url https://security.archlinux.org/ASA-201711-41
18
reference_url https://security.archlinux.org/ASA-201711-42
reference_id ASA-201711-42
reference_type
scores
url https://security.archlinux.org/ASA-201711-42
19
reference_url https://security.archlinux.org/AVG-531
reference_id AVG-531
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-531
20
reference_url https://security.archlinux.org/AVG-532
reference_id AVG-532
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-532
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16612
reference_id CVE-2017-16612
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16612
29
reference_url https://security.gentoo.org/glsa/201801-04
reference_id GLSA-201801-04
reference_type
scores
url https://security.gentoo.org/glsa/201801-04
30
reference_url https://usn.ubuntu.com/3501-1/
reference_id USN-3501-1
reference_type
scores
url https://usn.ubuntu.com/3501-1/
31
reference_url https://usn.ubuntu.com/3622-1/
reference_id USN-3622-1
reference_type
scores
url https://usn.ubuntu.com/3622-1/
fixed_packages
0
url pkg:deb/debian/libxcursor@1:1.1.14-1%2Bdeb8u1
purl pkg:deb/debian/libxcursor@1:1.1.14-1%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tt61-tq28-4ucw
1
vulnerability VCID-zyj3-3eg1-mqez
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.14-1%252Bdeb8u1
1
url pkg:deb/debian/libxcursor@1:1.1.14-1%2Bdeb9u2
purl pkg:deb/debian/libxcursor@1:1.1.14-1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tt61-tq28-4ucw
1
vulnerability VCID-zyj3-3eg1-mqez
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.14-1%252Bdeb9u2
2
url pkg:deb/debian/libxcursor@1:1.1.15-2
purl pkg:deb/debian/libxcursor@1:1.1.15-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.15-2
aliases CVE-2017-16612
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tt61-tq28-4ucw
2
url VCID-zyj3-3eg1-mqez
vulnerability_id VCID-zyj3-3eg1-mqez
summary libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9262.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9262.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9262
reference_id
reference_type
scores
0
value 0.03049
scoring_system epss
scoring_elements 0.86627
published_at 2026-04-01T12:55:00Z
1
value 0.03049
scoring_system epss
scoring_elements 0.86638
published_at 2026-04-02T12:55:00Z
2
value 0.03049
scoring_system epss
scoring_elements 0.86658
published_at 2026-04-04T12:55:00Z
3
value 0.03049
scoring_system epss
scoring_elements 0.86657
published_at 2026-04-07T12:55:00Z
4
value 0.03049
scoring_system epss
scoring_elements 0.86676
published_at 2026-04-08T12:55:00Z
5
value 0.03049
scoring_system epss
scoring_elements 0.86686
published_at 2026-04-09T12:55:00Z
6
value 0.03049
scoring_system epss
scoring_elements 0.86699
published_at 2026-04-11T12:55:00Z
7
value 0.03049
scoring_system epss
scoring_elements 0.86697
published_at 2026-04-12T12:55:00Z
8
value 0.03049
scoring_system epss
scoring_elements 0.8669
published_at 2026-04-13T12:55:00Z
9
value 0.03049
scoring_system epss
scoring_elements 0.86703
published_at 2026-04-21T12:55:00Z
10
value 0.03049
scoring_system epss
scoring_elements 0.86709
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9262
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1611599
reference_id 1611599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1611599
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906012
reference_id 906012
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906012
6
reference_url https://access.redhat.com/errata/RHSA-2018:3059
reference_id RHSA-2018:3059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3059
7
reference_url https://usn.ubuntu.com/3729-1/
reference_id USN-3729-1
reference_type
scores
url https://usn.ubuntu.com/3729-1/
fixed_packages
0
url pkg:deb/debian/libxcursor@1:1.1.15-2
purl pkg:deb/debian/libxcursor@1:1.1.15-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.15-2
aliases CVE-2015-9262
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyj3-3eg1-mqez
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libxcursor@1:1.1.10-2%252Bsqueeze1