{"url":"http://public2.vulnerablecode.io/api/packages/124062?format=json","purl":"pkg:rpm/redhat/libXext@1.3.2-2.1?arch=el6","type":"rpm","namespace":"redhat","name":"libXext","version":"1.3.2-2.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35532?format=json","vulnerability_id":"VCID-1ngj-ep8k-3bbc","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1999","reference_id":"","reference_type":"","scores":[{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75754","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.7583","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999"},{"reference_url":"http://www.debian.org/security/2013/dsa-2675","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2675"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1868-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1868-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960347","reference_id":"960347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960347"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1999","reference_id":"CVE-2013-1999","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1999"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1868-1/","reference_id":"USN-1868-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1868-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1999"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ngj-ep8k-3bbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35516?format=json","vulnerability_id":"VCID-3ap5-ppvg-juc1","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106880.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1988","reference_id":"","reference_type":"","scores":[{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74552","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74517","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988"},{"reference_url":"http://www.debian.org/security/2013/dsa-2688","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2688"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1864-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1864-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959066","reference_id":"959066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959066"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxres:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1988","reference_id":"CVE-2013-1988","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1988"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1864-1/","reference_id":"USN-1864-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1864-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1988"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ap5-ppvg-juc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35513?format=json","vulnerability_id":"VCID-3cdg-93ke-8fa9","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106857.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1986.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1986","reference_id":"","reference_type":"","scores":[{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986"},{"reference_url":"http://www.debian.org/security/2013/dsa-2684","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2684"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1862-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1862-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959059","reference_id":"959059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959059"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.2.99.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrandr:1.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1986","reference_id":"CVE-2013-1986","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1986"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1862-1/","reference_id":"USN-1862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1862-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1986"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3cdg-93ke-8fa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35519?format=json","vulnerability_id":"VCID-5323-m7nb-6yax","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1991.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1991","reference_id":"","reference_type":"","scores":[{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.7171","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71604","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71669","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71652","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71719","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00683","scoring_system":"epss","scoring_elements":"0.71724","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000"},{"reference_url":"http://www.debian.org/security/2013/dsa-2690","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2690"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1869-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1869-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959072","reference_id":"959072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959072"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1991","reference_id":"CVE-2013-1991","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1991"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1869-1/","reference_id":"USN-1869-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1869-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1991"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5323-m7nb-6yax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35518?format=json","vulnerability_id":"VCID-8aha-x3r3-uqen","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106766.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1990.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1990","reference_id":"","reference_type":"","scores":[{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999"},{"reference_url":"http://www.debian.org/security/2013/dsa-2675","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2675"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1868-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1868-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959070","reference_id":"959070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959070"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1990","reference_id":"CVE-2013-1990","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1990"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1868-1/","reference_id":"USN-1868-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1868-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1990"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8aha-x3r3-uqen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35537?format=json","vulnerability_id":"VCID-9jjr-recn-f3a2","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106872.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2001","reference_id":"","reference_type":"","scores":[{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78469","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78491","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78507","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.7854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0115","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001"},{"reference_url":"http://www.debian.org/security/2013/dsa-2692","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2692"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1870-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1870-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960350","reference_id":"960350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960350"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86vm:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2001","reference_id":"CVE-2013-2001","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2001"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1870-1/","reference_id":"USN-1870-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1870-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2001"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jjr-recn-f3a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35515?format=json","vulnerability_id":"VCID-ckk4-x9aw-8qh7","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106862.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1987.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1987","reference_id":"","reference_type":"","scores":[{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75669","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987"},{"reference_url":"http://www.debian.org/security/2013/dsa-2677","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2677"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60132","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60132"},{"reference_url":"http://www.ubuntu.com/usn/USN-1863-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1863-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959061","reference_id":"959061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959061"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxrender:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1987","reference_id":"CVE-2013-1987","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1987"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1863-1/","reference_id":"USN-1863-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1863-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1987"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckk4-x9aw-8qh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35548?format=json","vulnerability_id":"VCID-cv5u-c5s5-fqfp","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2062","reference_id":"","reference_type":"","scores":[{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67873","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67764","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67848","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67883","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00546","scoring_system":"epss","scoring_elements":"0.67899","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2062"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062"},{"reference_url":"http://www.debian.org/security/2013/dsa-2685","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2685"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1861-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1861-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960362","reference_id":"960362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960362"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxp:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2062","reference_id":"CVE-2013-2062","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2062"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1861-1/","reference_id":"USN-1861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1861-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2062"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cv5u-c5s5-fqfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35545?format=json","vulnerability_id":"VCID-dcgs-qd3h-k7gq","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2004","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60221","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60247","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60264","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.6027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60274","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"},{"reference_url":"http://www.debian.org/security/2013/dsa-2693","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2693"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1854-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1854-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959112","reference_id":"959112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959112"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2004","reference_id":"CVE-2013-2004","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2004"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1854-1/","reference_id":"USN-1854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1854-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2004"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35517?format=json","vulnerability_id":"VCID-dn3z-f522-hucu","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1989.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1989","reference_id":"","reference_type":"","scores":[{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066"},{"reference_url":"http://www.debian.org/security/2013/dsa-2674","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2674"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1867-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1867-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959068","reference_id":"959068","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959068"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1989","reference_id":"CVE-2013-1989","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1989"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1867-1/","reference_id":"USN-1867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1867-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1989"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dn3z-f522-hucu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=json","vulnerability_id":"VCID-e19k-nptv-ffgr","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7439","reference_id":"","reference_type":"","scores":[{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.8309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83166","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.83206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01877","scoring_system":"epss","scoring_elements":"0.8323","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209943","reference_id":"1209943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/2568-1/","reference_id":"USN-2568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2568-1/"}],"fixed_packages":[],"aliases":["CVE-2013-7439"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35501?format=json","vulnerability_id":"VCID-euc5-hkmw-3qf9","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1984","reference_id":"","reference_type":"","scores":[{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75794","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998"},{"reference_url":"http://www.debian.org/security/2013/dsa-2683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2683"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1859-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959049","reference_id":"959049","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959049"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1984","reference_id":"CVE-2013-1984","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1984"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1859-1/","reference_id":"USN-1859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1859-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1984"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-euc5-hkmw-3qf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35523?format=json","vulnerability_id":"VCID-h4tq-pktb-mqdt","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1995","reference_id":"","reference_type":"","scores":[{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74552","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74517","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7455","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998"},{"reference_url":"http://www.debian.org/security/2013/dsa-2683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2683"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60124","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60124"},{"reference_url":"http://www.ubuntu.com/usn/USN-1859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1859-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960357","reference_id":"960357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960357"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1995","reference_id":"CVE-2013-1995","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1995"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1859-1/","reference_id":"USN-1859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1859-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1995"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h4tq-pktb-mqdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35520?format=json","vulnerability_id":"VCID-hnx7-1muu-zqef","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/107024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1992.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1992","reference_id":"","reference_type":"","scores":[{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76625","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.7667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76754","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992"},{"reference_url":"http://www.debian.org/security/2013/dsa-2673","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2673"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1852-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1852-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959074","reference_id":"959074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959074"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libdmx:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1992","reference_id":"CVE-2013-1992","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1992"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1852-1/","reference_id":"USN-1852-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1852-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1992"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hnx7-1muu-zqef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35498?format=json","vulnerability_id":"VCID-j2u9-4cr6-yqcv","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1981","reference_id":"","reference_type":"","scores":[{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00894","scoring_system":"epss","scoring_elements":"0.75669","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"},{"reference_url":"http://www.debian.org/security/2013/dsa-2693","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2693"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60120","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60120"},{"reference_url":"http://www.ubuntu.com/usn/USN-1854-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1854-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959040","reference_id":"959040","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959040"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1981","reference_id":"CVE-2013-1981","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1981"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1854-1/","reference_id":"USN-1854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1854-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1981"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35541?format=json","vulnerability_id":"VCID-jy2n-5vjx-k7c1","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2002","reference_id":"","reference_type":"","scores":[{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75779","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75759","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75771","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005"},{"reference_url":"http://www.debian.org/security/2013/dsa-2680","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2680"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60137","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60137"},{"reference_url":"http://www.ubuntu.com/usn/USN-1865-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1865-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960352","reference_id":"960352","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960352"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2002","reference_id":"CVE-2013-2002","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2002"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1865-1/","reference_id":"USN-1865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1865-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2002"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jy2n-5vjx-k7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35527?format=json","vulnerability_id":"VCID-jz8t-44r3-3yc5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1997","reference_id":"","reference_type":"","scores":[{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72609","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72695","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"},{"reference_url":"http://www.debian.org/security/2013/dsa-2693","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2693"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1854-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1854-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960345","reference_id":"960345","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960345"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1997","reference_id":"CVE-2013-1997","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1997"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1854-1/","reference_id":"USN-1854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1854-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1997"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35543?format=json","vulnerability_id":"VCID-kdu9-jdub-myhy","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106791.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2003","reference_id":"","reference_type":"","scores":[{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75744","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.7563","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.7561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.7568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75662","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00899","scoring_system":"epss","scoring_elements":"0.75738","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003"},{"reference_url":"http://www.debian.org/security/2013/dsa-2681","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2681"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60121","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60121"},{"reference_url":"http://www.ubuntu.com/usn/USN-1856-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1856-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959077","reference_id":"959077","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959077"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcursor:1.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2003","reference_id":"CVE-2013-2003","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2003"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1856-1/","reference_id":"USN-1856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1856-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2003"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdu9-jdub-myhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35549?format=json","vulnerability_id":"VCID-kz7s-r6ad-qfa5","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106886.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2063.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2063","reference_id":"","reference_type":"","scores":[{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76625","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.7667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76754","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063"},{"reference_url":"http://www.debian.org/security/2013/dsa-2689","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2689"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1866-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1866-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960366","reference_id":"960366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960366"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.0.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxtst:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2063","reference_id":"CVE-2013-2063","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2063"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1866-1/","reference_id":"USN-1866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1866-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2063"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kz7s-r6ad-qfa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35535?format=json","vulnerability_id":"VCID-pcvu-rz99-wbec","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106870.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2000","reference_id":"","reference_type":"","scores":[{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72609","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72695","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000"},{"reference_url":"http://www.debian.org/security/2013/dsa-2690","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2690"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1869-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1869-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960349","reference_id":"960349","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960349"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.0.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxxf86dga:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2000","reference_id":"CVE-2013-2000","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2000"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1869-1/","reference_id":"USN-1869-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1869-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2000"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pcvu-rz99-wbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35546?format=json","vulnerability_id":"VCID-pkva-3f16-e7b4","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106785.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2005","reference_id":"","reference_type":"","scores":[{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71618","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7151","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71588","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71593","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71633","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005"},{"reference_url":"http://www.debian.org/security/2013/dsa-2680","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2680"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60133","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60133"},{"reference_url":"http://www.ubuntu.com/usn/USN-1865-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1865-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959108","reference_id":"959108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959108"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxt:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2005","reference_id":"CVE-2013-2005","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2005"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1865-1/","reference_id":"USN-1865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1865-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2005"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pkva-3f16-e7b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35500?format=json","vulnerability_id":"VCID-qk9r-eew2-ebdt","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1983","reference_id":"","reference_type":"","scores":[{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75779","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75803","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75839","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75867","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983"},{"reference_url":"http://www.debian.org/security/2013/dsa-2676","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2676"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1858-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1858-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959048","reference_id":"959048","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959048"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfixes:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1983","reference_id":"CVE-2013-1983","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1983"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1858-1/","reference_id":"USN-1858-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1858-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1983"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qk9r-eew2-ebdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35499?format=json","vulnerability_id":"VCID-qtg2-2uh4-3kgz","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1982","reference_id":"","reference_type":"","scores":[{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65571","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65454","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65595","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982"},{"reference_url":"http://www.debian.org/security/2013/dsa-2682","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2682"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1857-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1857-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959046","reference_id":"959046","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959046"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.0.99.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxext:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1982","reference_id":"CVE-2013-1982","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1982"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1857-1/","reference_id":"USN-1857-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1857-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1982"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg2-2uh4-3kgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35528?format=json","vulnerability_id":"VCID-sxvx-ndye-sbh3","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106913.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1998","reference_id":"","reference_type":"","scores":[{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75589","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.7562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75651","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.7564","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75679","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00896","scoring_system":"epss","scoring_elements":"0.75696","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998"},{"reference_url":"http://www.debian.org/security/2013/dsa-2683","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2683"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.securityfocus.com/bid/60127","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60127"},{"reference_url":"http://www.ubuntu.com/usn/USN-1859-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1859-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960346","reference_id":"960346","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960346"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1998","reference_id":"CVE-2013-1998","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1998"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1859-1/","reference_id":"USN-1859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1859-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1998"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxvx-ndye-sbh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35550?format=json","vulnerability_id":"VCID-wg33-s17g-xkf2","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106752.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2064","reference_id":"","reference_type":"","scores":[{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76358","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76227","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76284","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76311","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76357","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00943","scoring_system":"epss","scoring_elements":"0.76369","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064"},{"reference_url":"http://www.debian.org/security/2013/dsa-2686","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2686"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.securityfocus.com/bid/60148","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60148"},{"reference_url":"http://www.ubuntu.com/usn/USN-1855-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1855-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960367","reference_id":"960367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960367"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.90.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.92:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.1.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxcb:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2064","reference_id":"CVE-2013-2064","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2064"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1855-1/","reference_id":"USN-1855-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1855-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2064"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg33-s17g-xkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35506?format=json","vulnerability_id":"VCID-xq2n-wy4g-dkaz","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106845.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1985","reference_id":"","reference_type":"","scores":[{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74713","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74614","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.7462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74707","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00836","scoring_system":"epss","scoring_elements":"0.74709","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985"},{"reference_url":"http://www.debian.org/security/2013/dsa-2691","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2691"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1860-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1860-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=959056","reference_id":"959056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=959056"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.0.99.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxinerama:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1985","reference_id":"CVE-2013-1985","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1985"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1860-1/","reference_id":"USN-1860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1860-1/"}],"fixed_packages":[],"aliases":["CVE-2013-1985"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xq2n-wy4g-dkaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35552?format=json","vulnerability_id":"VCID-z7gv-ayeg-s3g1","summary":"Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106889.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2066","reference_id":"","reference_type":"","scores":[{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75754","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00906","scoring_system":"epss","scoring_elements":"0.7583","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066"},{"reference_url":"http://www.debian.org/security/2013/dsa-2674","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2674"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/23/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-1867-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1867-1"},{"reference_url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=960369","reference_id":"960369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=960369"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxv:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxv:1.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2066","reference_id":"CVE-2013-2066","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2066"},{"reference_url":"https://security.gentoo.org/glsa/201405-07","reference_id":"GLSA-201405-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1436","reference_id":"RHSA-2014:1436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1436"},{"reference_url":"https://usn.ubuntu.com/1867-1/","reference_id":"USN-1867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1867-1/"}],"fixed_packages":[],"aliases":["CVE-2013-2066"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7gv-ayeg-s3g1"}],"fixing_vulnerabilities":[],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libXext@1.3.2-2.1%3Farch=el6"}