Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/63540?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63540?format=api", "vulnerability_id": "VCID-1wj7-7cne-hugr", "summary": "Security researcher Alex Chapman reported that the Almost\nNative Graphics Layer Engine (ANGLE) library used by Mozilla is vulnerable to an\ninteger overflow. This vulnerability is present because of insufficient bounds\nchecking in the drawLineLoop function, which can be driven by web\ncontent to overflow allocated memory, leading to a potentially exploitable\ncrash.\nIn general this flaw cannot be exploited through email in the\nThunderbird product because scripting is disabled, but is potentially a risk in\nbrowser or browser-like contexts.", "aliases": [ { "alias": "CVE-2013-1721" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86526?format=api", "purl": "pkg:mozilla/Firefox@24.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@24.0.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api", "purl": "pkg:mozilla/Seamonkey@2.21.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0" } ], "affected_packages": [], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75719", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75525", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75562", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75592", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75596", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75606", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75636", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75662", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75647", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75664", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1721" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009213", "reference_id": "1009213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721", "reference_id": "CVE-2013-1721", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-78", "reference_id": "mfsa2013-78", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-78" }, { "reference_url": "https://usn.ubuntu.com/1951-1/", "reference_id": "USN-1951-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1951-1/" }, { "reference_url": "https://usn.ubuntu.com/1952-1/", "reference_id": "USN-1952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1952-1/" } ], "weaknesses": [ { "cwe_id": 190, "name": "Integer Overflow or Wraparound", "description": "The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control." } ], "exploits": [], "severity_range_score": "9.0 - 10.0", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wj7-7cne-hugr" }