Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/virtualbox@4.1.18-dfsg-2?distro=sid
Typedeb
Namespacedebian
Namevirtualbox
Version4.1.18-dfsg-2
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.2.16-dfsg-1
Latest_non_vulnerable_version7.2.6-dfsg-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9xpz-a6pw-mqbh
vulnerability_id VCID-9xpz-a6pw-mqbh
summary Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary."
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0420
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.2957
published_at 2026-04-21T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29747
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29793
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29612
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29675
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29712
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29715
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29671
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.2962
published_at 2026-04-13T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29639
published_at 2026-04-16T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0420
2
reference_url https://bugzilla.novell.com/show_bug.cgi?id=798776
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=798776
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763
4
reference_url https://www.virtualbox.org/changeset/44055/vbox
reference_id
reference_type
scores
url https://www.virtualbox.org/changeset/44055/vbox
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
6
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698292
reference_id 698292
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698292
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0420
reference_id CVE-2013-0420
reference_type
scores
0
value 2.4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0420
fixed_packages
0
url pkg:deb/debian/virtualbox@4.1.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.1.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.1.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2013-0420
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xpz-a6pw-mqbh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.1.18-dfsg-2%3Fdistro=sid