Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/72099?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "type": "ebuild", "namespace": "net-print", "name": "cups-filters", "version": "1.0.53", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.0.71", "latest_non_vulnerable_version": "1.28.17-r2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=api", "vulnerability_id": "VCID-4bxg-5tnm-y3hw", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5254", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52624", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52622", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52632", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52595", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52537", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5259", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52636", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52599", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" } ], "aliases": [ "CVE-2013-6476" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=api", "vulnerability_id": "VCID-843p-8xve-nfer", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95597", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95635", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95648", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95652", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" } ], "aliases": [ "CVE-2013-6474" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32183?format=api", "vulnerability_id": "VCID-cne2-7ev5-abgv", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2707", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.7995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.79958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.79979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.79968", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.79996", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80005", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80025", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80009", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80001", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80031", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80058", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80063", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80079", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80092", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80114", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80129", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80127", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01338", "scoring_system": "epss", "scoring_elements": "0.80142", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083326", "reference_id": "1083326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083326" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470", "reference_id": "743470", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2210-1/", "reference_id": "USN-2210-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2210-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" } ], "aliases": [ "CVE-2014-2707" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cne2-7ev5-abgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=api", "vulnerability_id": "VCID-mcmb-bvw9-dba5", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95557", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95605", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95607", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95622", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95625", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95638", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550", "reference_id": "1027550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" } ], "aliases": [ "CVE-2013-6475" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32178?format=api", "vulnerability_id": "VCID-vunm-ehd2-yugs", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6473", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94225", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94234", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94265", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94266", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.9428", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94286", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94289", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94288", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94294", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94304", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94315", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.9432", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.13715", "scoring_system": "epss", "scoring_elements": "0.94326", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/72099?format=api", "purl": "pkg:ebuild/net-print/cups-filters@1.0.53", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" } ], "aliases": [ "CVE-2013-6473" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vunm-ehd2-yugs" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53" }