{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","type":"ebuild","namespace":"net-print","name":"cups-filters","version":"1.0.53","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.0.71","latest_non_vulnerable_version":"1.28.17-r2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=json","vulnerability_id":"VCID-4bxg-5tnm-y3hw","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6476","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5254","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52624","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5268","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52595","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5259","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52636","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52599","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53704","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"aliases":["CVE-2013-6476"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=json","vulnerability_id":"VCID-843p-8xve-nfer","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6474","reference_id":"","reference_type":"","scores":[{"value":"0.14176","scoring_system":"epss","scoring_elements":"0.94451","published_at":"2026-05-14T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95567","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95642","published_at":"2026-05-09T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95652","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95613","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"aliases":["CVE-2013-6474"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32183?format=json","vulnerability_id":"VCID-cne2-7ev5-abgv","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2707","reference_id":"","reference_type":"","scores":[{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.7995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80058","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80114","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80129","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80184","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1083326","reference_id":"1083326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1083326"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470","reference_id":"743470","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2210-1/","reference_id":"USN-2210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"aliases":["CVE-2014-2707"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cne2-7ev5-abgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=json","vulnerability_id":"VCID-mcmb-bvw9-dba5","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6475","reference_id":"","reference_type":"","scores":[{"value":"0.14107","scoring_system":"epss","scoring_elements":"0.94432","published_at":"2026-05-14T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.9558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.9559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95557","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95625","published_at":"2026-05-07T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95632","published_at":"2026-05-09T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-05-11T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95642","published_at":"2026-05-12T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95599","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027550","reference_id":"1027550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027550"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"aliases":["CVE-2013-6475"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32178?format=json","vulnerability_id":"VCID-vunm-ehd2-yugs","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6473","reference_id":"","reference_type":"","scores":[{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94225","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.9428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94286","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94315","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.9432","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94326","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94341","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"aliases":["CVE-2013-6473"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vunm-ehd2-yugs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}