Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/63566?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63566?format=api", "vulnerability_id": "VCID-yyxz-1qxq-bqhg", "summary": "Security researcher Seb Patane reported stack buffer\noverflows in both the Maintenance Service and the Mozilla Updater when\nunexpectedly long paths were encountered. A local attacker could pass these as\ncommand-line arguments to the Maintenance Service to crash either program and\npotentially lead to arbitrary code being run with the Administrator privileges\nused by the Maintenance Service and inherited by the Updater.", "aliases": [ { "alias": "CVE-2013-1706" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86527?format=api", "purl": "pkg:mozilla/Firefox@23.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@23.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86528?format=api", "purl": "pkg:mozilla/Firefox%20ESR@17.0.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@17.0.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/86531?format=api", "purl": "pkg:mozilla/Seamonkey@2.20.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.20.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86529?format=api", "purl": "pkg:mozilla/Thunderbird@17.0.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@17.0.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/86530?format=api", "purl": "pkg:mozilla/Thunderbird%20ESR@17.0.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird%2520ESR@17.0.8" } ], "affected_packages": [], "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15186", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15357", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15369", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1533", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15264", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15178", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706", "reference_id": "CVE-2013-1706", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-66", "reference_id": "mfsa2013-66", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-66" } ], "weaknesses": [], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyxz-1qxq-bqhg" }