Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/74145?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "type": "ebuild", "namespace": "x11-base", "name": "xorg-server", "version": "1.14.3-r2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.18.4", "latest_non_vulnerable_version": "21.1.16", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35532?format=api", "vulnerability_id": "VCID-1ngj-ep8k-3bbc", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75813", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75774", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2675" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1868-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1868-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960347", "reference_id": "960347", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960347" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1999", "reference_id": "CVE-2013-1999", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1999" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1868-1/", "reference_id": "USN-1868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1868-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1999" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ngj-ep8k-3bbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35516?format=api", "vulnerability_id": "VCID-3ap5-ppvg-juc1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1988", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.7451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74517", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74509", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2688", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2688" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1864-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1864-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959066", "reference_id": "959066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959066" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1988", "reference_id": "CVE-2013-1988", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1988" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1864-1/", "reference_id": "USN-1864-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1864-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1988" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ap5-ppvg-juc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35513?format=api", "vulnerability_id": "VCID-3cdg-93ke-8fa9", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1986", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2684" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1862-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1862-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959059", "reference_id": "959059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959059" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1986", "reference_id": "CVE-2013-1986", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1986" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1862-1/", "reference_id": "USN-1862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1862-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1986" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3cdg-93ke-8fa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35495?format=api", "vulnerability_id": "VCID-4en9-s3k2-eydr", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1940.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23159", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23314", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23487", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2343", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23375", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2335", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1940" }, { "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=63353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.freedesktop.org/show_bug.cgi?id=63353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2661", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2661" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/18/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/04/18/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1803-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1803-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=950438", "reference_id": "950438", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950438" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x.org-xserver:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1940", "reference_id": "CVE-2013-1940", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1940" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1620", "reference_id": "RHSA-2013:1620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1620" }, { "reference_url": "https://usn.ubuntu.com/1803-1/", "reference_id": "USN-1803-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1803-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1940" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4en9-s3k2-eydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35519?format=api", "vulnerability_id": "VCID-5323-m7nb-6yax", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71714", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2690" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1869-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1869-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959072", "reference_id": "959072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959072" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1991", "reference_id": "CVE-2013-1991", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1991" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1869-1/", "reference_id": "USN-1869-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1869-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1991" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5323-m7nb-6yax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35518?format=api", "vulnerability_id": "VCID-8aha-x3r3-uqen", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2675", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2675" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1868-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1868-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959070", "reference_id": "959070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1990", "reference_id": "CVE-2013-1990", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1990" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1868-1/", "reference_id": "USN-1868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1868-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1990" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8aha-x3r3-uqen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35526?format=api", "vulnerability_id": "VCID-99kc-tfqp-r3ey", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1996.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1996.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71714", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1996" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2687", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2687" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60130", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60130" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1853-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1853-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960360", "reference_id": "960360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960360" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libfs:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libfs:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libfs:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libfs:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libfs:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1996", "reference_id": "CVE-2013-1996", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1996" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://usn.ubuntu.com/1853-1/", "reference_id": "USN-1853-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1853-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1996" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99kc-tfqp-r3ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35537?format=api", "vulnerability_id": "VCID-9jjr-recn-f3a2", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7854", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78438", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78469", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78453", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78479", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78491", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0115", "scoring_system": "epss", "scoring_elements": "0.78507", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2692", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2692" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1870-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1870-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960350", "reference_id": "960350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960350" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2001", "reference_id": "CVE-2013-2001", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2001" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1870-1/", "reference_id": "USN-1870-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1870-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2001" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jjr-recn-f3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35553?format=api", "vulnerability_id": "VCID-agtx-nbcj-jufj", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4396.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4396", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83484", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83522", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83531", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83546", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.8354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.8357", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83571", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01971", "scoring_system": "epss", "scoring_elements": "0.83597", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4396" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1014561", "reference_id": "1014561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1014561" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1426", "reference_id": "RHSA-2013:1426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1426" }, { "reference_url": "https://usn.ubuntu.com/1990-1/", "reference_id": "USN-1990-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1990-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-4396" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-agtx-nbcj-jufj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35522?format=api", "vulnerability_id": "VCID-aka1-h2d4-y7fs", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1994.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1994.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1994", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61906", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61944", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61932", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61959", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00419", "scoring_system": "epss", "scoring_elements": "0.61941", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1994" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2679" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1871-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1871-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959079", "reference_id": "959079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959079" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openchrome:openchrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openchrome:openchrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openchrome:openchrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libchromexvmc:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libchromexvmc:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libchromexvmc:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libchromexvmcpro:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libchromexvmcpro:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libchromexvmcpro:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1994", "reference_id": "CVE-2013-1994", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1994" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://usn.ubuntu.com/1871-1/", "reference_id": "USN-1871-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1871-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1994" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aka1-h2d4-y7fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35515?format=api", "vulnerability_id": "VCID-ckk4-x9aw-8qh7", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1987", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2677", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2677" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60132", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60132" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1863-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1863-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959061", "reference_id": "959061", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959061" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1987", "reference_id": "CVE-2013-1987", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1987" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1863-1/", "reference_id": "USN-1863-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1863-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1987" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckk4-x9aw-8qh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35548?format=api", "vulnerability_id": "VCID-cv5u-c5s5-fqfp", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67884", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67764", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67848", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67871", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67835", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67883", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00546", "scoring_system": "epss", "scoring_elements": "0.67865", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2062" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2685", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2685" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1861-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1861-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960362", "reference_id": "960362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2062", "reference_id": "CVE-2013-2062", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2062" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1861-1/", "reference_id": "USN-1861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1861-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2062" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cv5u-c5s5-fqfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35545?format=api", "vulnerability_id": "VCID-dcgs-qd3h-k7gq", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6027", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60286", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60313", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112", "reference_id": "959112", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004", "reference_id": "CVE-2013-2004", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2004" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35517?format=api", "vulnerability_id": "VCID-dn3z-f522-hucu", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2674" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1867-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959068", "reference_id": "959068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959068" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1989", "reference_id": "CVE-2013-1989", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1989" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1867-1/", "reference_id": "USN-1867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1989" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3z-f522-hucu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35501?format=api", "vulnerability_id": "VCID-euc5-hkmw-3qf9", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75736", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75738", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959049", "reference_id": "959049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959049" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1984", "reference_id": "CVE-2013-1984", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1984" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1984" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-euc5-hkmw-3qf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35523?format=api", "vulnerability_id": "VCID-h4tq-pktb-mqdt", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74544", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74472", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.7451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74517", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00826", "scoring_system": "epss", "scoring_elements": "0.74509", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60124", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60124" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960357", "reference_id": "960357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960357" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1995", "reference_id": "CVE-2013-1995", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1995" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1995" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h4tq-pktb-mqdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35520?format=api", "vulnerability_id": "VCID-hnx7-1muu-zqef", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1992", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76716", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2673", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2673" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1852-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1852-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959074", "reference_id": "959074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959074" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1992", "reference_id": "CVE-2013-1992", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1992" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1852-1/", "reference_id": "USN-1852-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1852-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1992" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnx7-1muu-zqef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35494?format=api", "vulnerability_id": "VCID-hu5s-38nd-uqbs", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16772", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16938", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16776", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16851", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16793", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16728", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1677", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16676", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052324", "reference_id": "1052324", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1052324" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://usn.ubuntu.com/1990-1/", "reference_id": "USN-1990-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1990-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1056" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hu5s-38nd-uqbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35498?format=api", "vulnerability_id": "VCID-j2u9-4cr6-yqcv", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75595", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00894", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60120" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040", "reference_id": "959040", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981", "reference_id": "CVE-2013-1981", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1981" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35541?format=api", "vulnerability_id": "VCID-jy2n-5vjx-k7c1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75753", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75629", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75692", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00902", "scoring_system": "epss", "scoring_elements": "0.75714", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2680", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2680" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60137" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1865-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1865-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960352", "reference_id": "960352", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960352" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2002", "reference_id": "CVE-2013-2002", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2002" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1865-1/", "reference_id": "USN-1865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1865-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2002" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jy2n-5vjx-k7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35527?format=api", "vulnerability_id": "VCID-jz8t-44r3-3yc5", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.7269", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2693", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2693" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1854-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1854-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345", "reference_id": "960345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997", "reference_id": "CVE-2013-1997", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1854-1/", "reference_id": "USN-1854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1854-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1997" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35543?format=api", "vulnerability_id": "VCID-kdu9-jdub-myhy", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2003", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75722", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75598", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7563", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.7568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75694", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75697", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00899", "scoring_system": "epss", "scoring_elements": "0.75683", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2681", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2681" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60121" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1856-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1856-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959077", "reference_id": "959077", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959077" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2003", "reference_id": "CVE-2013-2003", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2003" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1856-1/", "reference_id": "USN-1856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1856-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2003" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdu9-jdub-myhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35549?format=api", "vulnerability_id": "VCID-kz7s-r6ad-qfa5", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2063", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76689", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00974", "scoring_system": "epss", "scoring_elements": "0.76716", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2063" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2689" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1866-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1866-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960366", "reference_id": "960366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960366" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2063", "reference_id": "CVE-2013-2063", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2063" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1866-1/", "reference_id": "USN-1866-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1866-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2063" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kz7s-r6ad-qfa5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35535?format=api", "vulnerability_id": "VCID-pcvu-rz99-wbec", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.7269", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72582", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72615", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72647", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00727", "scoring_system": "epss", "scoring_elements": "0.72648", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2690" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1869-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1869-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960349", "reference_id": "960349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960349" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2000", "reference_id": "CVE-2013-2000", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2000" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1869-1/", "reference_id": "USN-1869-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1869-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2000" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcvu-rz99-wbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35546?format=api", "vulnerability_id": "VCID-pkva-3f16-e7b4", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71623", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71504", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7151", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7156", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71588", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71593", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71572", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2680", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2680" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60133" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1865-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1865-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959108", "reference_id": "959108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959108" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2005", "reference_id": "CVE-2013-2005", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2005" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1865-1/", "reference_id": "USN-1865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1865-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2005" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkva-3f16-e7b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35500?format=api", "vulnerability_id": "VCID-qk9r-eew2-ebdt", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75867", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75779", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75791", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75807", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75801", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75839", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75843", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00909", "scoring_system": "epss", "scoring_elements": "0.75828", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2676", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2676" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1858-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1858-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959048", "reference_id": "959048", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959048" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1983", "reference_id": "CVE-2013-1983", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1983" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1858-1/", "reference_id": "USN-1858-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1858-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1983" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qk9r-eew2-ebdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35521?format=api", "vulnerability_id": "VCID-qqd6-hfbc-3fgt", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2013-0190.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2013-0190.html" }, { "reference_url": "http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html" }, { "reference_url": "http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0897.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0897.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0898.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0898.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1993.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1993.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1993", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83826", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83699", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83727", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.8373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.8376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83776", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.8377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.838", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02022", "scoring_system": "epss", "scoring_elements": "0.83801", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2678", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2678" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:181", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:181" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1888-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1888-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=961613", "reference_id": "961613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=961613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1993", "reference_id": "CVE-2013-1993", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1993" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0897", "reference_id": "RHSA-2013:0897", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0897" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0898", "reference_id": "RHSA-2013:0898", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0898" }, { "reference_url": "https://usn.ubuntu.com/1888-1/", "reference_id": "USN-1888-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1888-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1993" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqd6-hfbc-3fgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35499?format=api", "vulnerability_id": "VCID-qtg2-2uh4-3kgz", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65495", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65559", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65573", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65585", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.6557", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2682", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2682" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1857-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1857-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959046", "reference_id": "959046", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959046" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1982", "reference_id": "CVE-2013-1982", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1982" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1857-1/", "reference_id": "USN-1857-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1857-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1982" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg2-2uh4-3kgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35528?format=api", "vulnerability_id": "VCID-sxvx-ndye-sbh3", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75679", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75589", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75603", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.7562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00896", "scoring_system": "epss", "scoring_elements": "0.7564", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2683" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.securityfocus.com/bid/60127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60127" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1859-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1859-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960346", "reference_id": "960346", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960346" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1998", "reference_id": "CVE-2013-1998", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1998" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1859-1/", "reference_id": "USN-1859-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1859-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1998" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sxvx-ndye-sbh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35550?format=api", "vulnerability_id": "VCID-wg33-s17g-xkf2", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2064", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.7635", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76223", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76238", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76271", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76284", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76311", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76325", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76329", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00943", "scoring_system": "epss", "scoring_elements": "0.76313", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2686", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2686" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.securityfocus.com/bid/60148", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60148" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1855-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1855-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960367", "reference_id": "960367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960367" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2064", "reference_id": "CVE-2013-2064", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2064" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1855-1/", "reference_id": "USN-1855-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1855-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2064" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wg33-s17g-xkf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35506?format=api", "vulnerability_id": "VCID-xq2n-wy4g-dkaz", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1985", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.747", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74583", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74587", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.7462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00836", "scoring_system": "epss", "scoring_elements": "0.74665", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2691", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2691" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1860-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959056", "reference_id": "959056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959056" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1985", "reference_id": "CVE-2013-1985", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1985" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1860-1/", "reference_id": "USN-1860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1860-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-1985" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq2n-wy4g-dkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35552?format=api", "vulnerability_id": "VCID-z7gv-ayeg-s3g1", "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n allowing attackers to execute arbitrary code or cause a Denial of Service\n condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75813", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75754", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00906", "scoring_system": "epss", "scoring_elements": "0.75774", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2674", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2674" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1867-1" }, { "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960369", "reference_id": "960369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960369" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2066", "reference_id": "CVE-2013-2066", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2066" }, { "reference_url": "https://security.gentoo.org/glsa/201405-07", "reference_id": "GLSA-201405-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436", "reference_id": "RHSA-2014:1436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1436" }, { "reference_url": "https://usn.ubuntu.com/1867-1/", "reference_id": "USN-1867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74145?format=api", "purl": "pkg:ebuild/x11-base/xorg-server@1.14.3-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" } ], "aliases": [ "CVE-2013-2066" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7gv-ayeg-s3g1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-base/xorg-server@1.14.3-r2" }