{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32178?format=json","vulnerability_id":"VCID-vunm-ehd2-yugs","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","aliases":[{"alias":"CVE-2013-6473"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584175?format=json","purl":"pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1035665?format=json","purl":"pkg:deb/debian/cups-filters@1.0.61-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5"},{"url":"http://public2.vulnerablecode.io/api/packages/582542?format=json","purl":"pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582543?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582544?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582545?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/72099?format=json","purl":"pkg:ebuild/net-print/cups-filters@1.0.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups-filters@1.0.53"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035664?format=json","purl":"pkg:deb/debian/cups-filters@1.0.18-2.1%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-4bxg-5tnm-y3hw"},{"vulnerability":"VCID-581d-k9k6-rke4"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-843p-8xve-nfer"},{"vulnerability":"VCID-8vd7-dfbu-23d4"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-bgm5-bmfa-yugq"},{"vulnerability":"VCID-cne2-7ev5-abgv"},{"vulnerability":"VCID-dvvu-6p49-vbhz"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-mcmb-bvw9-dba5"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vunm-ehd2-yugs"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.18-2.1%252Bdeb7u2"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6473","reference_id":"","reference_type":"","scores":[{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94225","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94266","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.9428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94286","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94315","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.9432","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94326","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13715","scoring_system":"epss","scoring_elements":"0.94341","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.1","risk_score":0.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vunm-ehd2-yugs"}