Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1049083?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "3.4.10-0+deb11u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.4.14-0+deb13u1", "latest_non_vulnerable_version": "4.4.14-0+deb13u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=api", "vulnerability_id": "VCID-114w-j43h-p3ek", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20318", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20860", "reference_id": "20860", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20860" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573", "reference_id": "2418573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html", "reference_id": "wnpa-sec-2025-07.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13945" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78708?format=api", "vulnerability_id": "VCID-18xy-vuns-eqcx", "summary": "wireshark: NFS dissector memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26041", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.261", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18628", "reference_id": "18628", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18628" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165846", "reference_id": "2165846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165846" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json", "reference_id": "CVE-2023-0417.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html", "reference_id": "wnpa-sec-2023-02.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0417" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78129?format=api", "vulnerability_id": "VCID-1b6n-9bub-1ueu", "summary": "wireshark: DoS (crash) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12412", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12466", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12579", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19144", "reference_id": "19144", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19144" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235813", "reference_id": "2235813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235813" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-23.html", "reference_id": "wnpa-sec-2023-23.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-23.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4512" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32115?format=api", "vulnerability_id": "VCID-1dz1-t49g-47bx", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06371", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06477", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0646", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054047", "reference_id": "2054047", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054047" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0586" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78706?format=api", "vulnerability_id": "VCID-23d3-1z9s-r7ht", "summary": "wireshark: iSCSI dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37125", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37186", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37152", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18796", "reference_id": "18796", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18796" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165844", "reference_id": "2165844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165844" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json", "reference_id": "CVE-2023-0415.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html", "reference_id": "wnpa-sec-2023-05.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0415" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77147?format=api", "vulnerability_id": "VCID-2bjq-y76h-qbhd", "summary": "wireshark: T.38 dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26444", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26537", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111", "reference_id": "1068111", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19695", "reference_id": "19695", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19695" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271741", "reference_id": "2271741", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271741" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html", "reference_id": "wnpa-sec-2024-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-2955" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=api", "vulnerability_id": "VCID-2pgm-khz1-auay", "summary": "wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20884", "reference_id": "20884", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20884" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572", "reference_id": "2418572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html", "reference_id": "wnpa-sec-2025-08.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13946" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32114?format=api", "vulnerability_id": "VCID-436x-av41-43g4", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1565", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15555", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1549", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054049", "reference_id": "2054049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054049" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0585" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32111?format=api", "vulnerability_id": "VCID-63pm-hact-8ybw", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22456", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22397", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22478", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22439", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054059", "reference_id": "2054059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054059" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0581" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78707?format=api", "vulnerability_id": "VCID-6exv-jrtx-8yab", "summary": "wireshark: GNW dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17884", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1784", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18779", "reference_id": "18779", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165845", "reference_id": "2165845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165845" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json", "reference_id": "CVE-2023-0416.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html", "reference_id": "wnpa-sec-2023-04.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0416" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76367?format=api", "vulnerability_id": "VCID-7cgx-1cxn-7bdk", "summary": "wireshark: Editcap secret injection crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06042", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06121", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06107", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19782", "reference_id": "19782", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19782" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19783", "reference_id": "19783", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19783" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19784", "reference_id": "19784", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19784" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280711", "reference_id": "2280711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280711" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html", "reference_id": "wnpa-sec-2024-08.html", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4855" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7cgx-1cxn-7bdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78704?format=api", "vulnerability_id": "VCID-9b6w-s1cn-57hz", "summary": "wireshark: dissection engine crash via conversation tracking module", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0413", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34818", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34813", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18766", "reference_id": "18766", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18766" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165842", "reference_id": "2165842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165842" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json", "reference_id": "CVE-2023-0413.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html", "reference_id": "wnpa-sec-2023-03.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0413" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95597?format=api", "vulnerability_id": "VCID-a9rv-3ka3-67fr", "summary": "Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04154", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04189", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05063", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05045", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101", "reference_id": "1041101", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19105", "reference_id": "19105", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19105" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-21.html", "reference_id": "wnpa-sec-2023-21.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-21.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-3648" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61361?format=api", "vulnerability_id": "VCID-beux-z8f3-bbg4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12943", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19083", "reference_id": "19083", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19083" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210824", "reference_id": "2210824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210824" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json", "reference_id": "CVE-2023-2856.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html", "reference_id": "wnpa-sec-2023-16.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2856" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32112?format=api", "vulnerability_id": "VCID-ce6b-zqtu-jkdt", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20112", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054056", "reference_id": "2054056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054056" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0582" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77957?format=api", "vulnerability_id": "VCID-cvch-5rbz-gyah", "summary": "wireshark: NetScreen File Parsing Heap-based Buffer Overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13946", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13909", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14049", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19404", "reference_id": "19404", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19404" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250151", "reference_id": "2250151", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250151" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html", "reference_id": "wnpa-sec-2023-29.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-6175" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61352?format=api", "vulnerability_id": "VCID-d1fd-fcrt-j7bj", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01642", "scoring_system": "epss", "scoring_elements": "0.81894", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.8299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83008", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19085", "reference_id": "19085", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19085" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210832", "reference_id": "2210832", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210832" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0666.html", "reference_id": "CVE-2023-0666.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0666.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "reference_id": "wireshark-4.0.6.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-18.html", "reference_id": "wnpa-sec-2023-18.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-18.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0666" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61353?format=api", "vulnerability_id": "VCID-d95z-wdv1-yye6", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45707", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19086", "reference_id": "19086", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229692", "reference_id": "2229692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229692" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0667.html", "reference_id": "CVE-2023-0667.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0667.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0667" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61356?format=api", "vulnerability_id": "VCID-dc45-d39b-u7bt", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1992", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53234", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5327", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18852", "reference_id": "18852", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18852" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186329", "reference_id": "2186329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186329" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json", "reference_id": "CVE-2023-1992.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html", "reference_id": "wnpa-sec-2023-09.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1992" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61355?format=api", "vulnerability_id": "VCID-dy74-uv3r-x7bs", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41509", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41514", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756", "reference_id": "1033756", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18839", "reference_id": "18839", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18839" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176452", "reference_id": "2176452", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176452" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json", "reference_id": "CVE-2023-1161.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html", "reference_id": "wnpa-sec-2023-08.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1161" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61358?format=api", "vulnerability_id": "VCID-eed3-ztv5-yqg9", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1994", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50461", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50502", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50468", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52092", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18947", "reference_id": "18947", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18947" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186325", "reference_id": "2186325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186325" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json", "reference_id": "CVE-2023-1994.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html", "reference_id": "wnpa-sec-2023-11.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1994" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74122?format=api", "vulnerability_id": "VCID-end1-k29u-m7g8", "summary": "wireshark: NTLMSSP dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8250", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0917", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298", "reference_id": "1080298", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19943", "reference_id": "19943", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19943" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308421", "reference_id": "2308421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308421" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-11.html", "reference_id": "wnpa-sec-2024-11.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-11.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-8250" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32099?format=api", "vulnerability_id": "VCID-eqkh-wnhk-5fdh", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32147", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32218", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32149", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039013", "reference_id": "2039013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039013" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4186" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61357?format=api", "vulnerability_id": "VCID-fve5-m93p-vbf3", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1993", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49241", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.4929", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18900", "reference_id": "18900", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18900" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186327", "reference_id": "2186327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186327" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json", "reference_id": "CVE-2023-1993.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html", "reference_id": "wnpa-sec-2023-10.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1993" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77873?format=api", "vulnerability_id": "VCID-g38d-wdq8-sfgv", "summary": "wireshark: GVCP dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09794", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09897", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19496", "reference_id": "19496", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19496" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256659", "reference_id": "2256659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256659" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html", "reference_id": "wnpa-sec-2024-01.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0208" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76368?format=api", "vulnerability_id": "VCID-h36t-f662-4ufw", "summary": "wireshark: Editcap byte chopping crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19605", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19652", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19451", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19724", "reference_id": "19724", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280718", "reference_id": "2280718", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280718" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html", "reference_id": "wnpa-sec-2024-08.html", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4853" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78703?format=api", "vulnerability_id": "VCID-h51a-cp8r-r3fx", "summary": "wireshark: TIPC dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4314", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43155", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43189", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43156", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18770", "reference_id": "18770", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18770" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165841", "reference_id": "2165841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165841" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json", "reference_id": "CVE-2023-0412.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html", "reference_id": "wnpa-sec-2023-07.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0412" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78767?format=api", "vulnerability_id": "VCID-jka6-e5fr-rkcv", "summary": "wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26301", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26341", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26191", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160659", "reference_id": "2160659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160659" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json", "reference_id": "CVE-2022-4345.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/", "reference_id": "RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/", "reference_id": "SGWIW6K64PKC375YAONYXKIVT2FDEDV3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html", "reference_id": "wnpa-sec-2022-09.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-4345" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78126?format=api", "vulnerability_id": "VCID-jknb-n171-8udz", "summary": "wireshark: possible Denial of Service via crafted package", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43748", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19229", "reference_id": "19229", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19229" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235363", "reference_id": "2235363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235363" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/", "reference_id": "6HCUPLDY7HLPO46PHMGIJSUBJFTT237C", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-2906.html", "reference_id": "CVE-2023-2906.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-2906.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/", "reference_id": "L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/", "reference_id": "TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2906" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95598?format=api", "vulnerability_id": "VCID-k49z-j5v1-pkhf", "summary": "iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06453", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0749", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101", "reference_id": "1041101", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19164", "reference_id": "19164", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19164" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html", "reference_id": "wnpa-sec-2023-22.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-3649" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61365?format=api", "vulnerability_id": "VCID-k6r8-3ckd-87bf", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08983", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19100", "reference_id": "19100", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19100" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211406", "reference_id": "2211406", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211406" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json", "reference_id": "CVE-2023-2952.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html", "reference_id": "wnpa-sec-2023-20.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2952" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76354?format=api", "vulnerability_id": "VCID-kpe5-12b6-pbes", "summary": "wireshark: MONGO and ZigBee TLV dissector infinite loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4854", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71079", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.7104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71096", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15047", "reference_id": "15047", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15047" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15499", "reference_id": "15499", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15499" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19726", "reference_id": "19726", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19726" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280715", "reference_id": "2280715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280715" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html", "reference_id": "wnpa-sec-2024-07.html", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4854" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78130?format=api", "vulnerability_id": "VCID-ksm5-9amq-aqg1", "summary": "wireshark: DoS (memory leak) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05748", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05809", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235814", "reference_id": "2235814", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235814" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4513" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32095?format=api", "vulnerability_id": "VCID-ktks-hvzs-c7ep", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12834", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12716", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039005", "reference_id": "2039005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039005" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4182" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32094?format=api", "vulnerability_id": "VCID-ky3g-7wfh-v7fz", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3951", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39525", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39536", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39481", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039000", "reference_id": "2039000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039000" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4181" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=api", "vulnerability_id": "VCID-m58x-8cam-3fdy", "summary": "wireshark: Improper Handling of Missing Values in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39657", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20114", "reference_id": "20114", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746", "reference_id": "2317746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html", "reference_id": "wnpa-sec-2024-13.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-9781" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64424?format=api", "vulnerability_id": "VCID-mb3r-da54-7kfk", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1112", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10941", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11076", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11023", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639", "reference_id": "2442639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-3203" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32113?format=api", "vulnerability_id": "VCID-ne4k-vht4-rue7", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23263", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23334", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23239", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054051", "reference_id": "2054051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054051" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0583" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78766?format=api", "vulnerability_id": "VCID-p3ew-pwr9-7yek", "summary": "wireshark: kafka dissector memory exhaustion.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33339", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33479", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33361", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160658", "reference_id": "2160658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160658" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json", "reference_id": "CVE-2022-4344.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/", "reference_id": "RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/", "reference_id": "SGWIW6K64PKC375YAONYXKIVT2FDEDV3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html", "reference_id": "wnpa-sec-2022-10.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-4344" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79031?format=api", "vulnerability_id": "VCID-prdk-zfnn-cyg3", "summary": "wireshark: f5ethtrailer Infinite loop in legacy style dissector", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05384", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05376", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152061", "reference_id": "2152061", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2373", "reference_id": "RHSA-2023:2373", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2373" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-3190" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78702?format=api", "vulnerability_id": "VCID-prz6-jk3b-wbhw", "summary": "wireshark: Multiple dissector excessive loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0411", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25101", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25154", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18711", "reference_id": "18711", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18711" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18720", "reference_id": "18720", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18720" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18737", "reference_id": "18737", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165825", "reference_id": "2165825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165825" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json", "reference_id": "CVE-2023-0411.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html", "reference_id": "wnpa-sec-2023-06.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0411" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=api", "vulnerability_id": "VCID-qs6k-my1v-8qh4", "summary": "wireshark: Access of Uninitialized Pointer in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05583", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05568", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20823", "reference_id": "20823", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293", "reference_id": "2416293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23083", "reference_id": "RHSA-2025:23083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23142", "reference_id": "RHSA-2025:23142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0432", "reference_id": "RHSA-2026:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0433", "reference_id": "RHSA-2026:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0452", "reference_id": "RHSA-2026:0452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0454", "reference_id": "RHSA-2026:0454", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0483", "reference_id": "RHSA-2026:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0483" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html", "reference_id": "wnpa-sec-2025-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13499" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=api", "vulnerability_id": "VCID-r54z-8gcg-pqg7", "summary": "wireshark: MONGO dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00859", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852", "reference_id": "1117852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20724", "reference_id": "20724", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225", "reference_id": "2403225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html", "reference_id": "wnpa-sec-2025-04.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-11626" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61360?format=api", "vulnerability_id": "VCID-r9dr-xdt4-vke2", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18238", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18056", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19062", "reference_id": "19062", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19062" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210822", "reference_id": "2210822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210822" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json", "reference_id": "CVE-2023-2855.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html", "reference_id": "wnpa-sec-2023-12.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2855" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=api", "vulnerability_id": "VCID-ra98-yk72-bkfq", "summary": "wireshark: Buffer Overflow in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515", "reference_id": "1107515", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20509", "reference_id": "20509", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20509" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225", "reference_id": "2370225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html", "reference_id": "wnpa-sec-2025-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-5601" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32100?format=api", "vulnerability_id": "VCID-s3e9-4cud-ufdn", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31078", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31085", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30996", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039029", "reference_id": "2039029", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039029" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4190" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=api", "vulnerability_id": "VCID-shbm-pwte-rkgt", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07586", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20214", "reference_id": "20214", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763", "reference_id": "2327763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html", "reference_id": "wnpa-sec-2024-15.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-11596" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77872?format=api", "vulnerability_id": "VCID-sj7t-z4pv-7ucz", "summary": "wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12733", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1283", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19501", "reference_id": "19501", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19501" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256656", "reference_id": "2256656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256656" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html", "reference_id": "wnpa-sec-2024-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0209" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61364?format=api", "vulnerability_id": "VCID-t7vh-m6cf-rfef", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2879", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29808", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19068", "reference_id": "19068", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19068" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210466", "reference_id": "2210466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210466" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json", "reference_id": "CVE-2023-2879.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html", "reference_id": "wnpa-sec-2023-14.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2879" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32098?format=api", "vulnerability_id": "VCID-tk9u-gtk1-v3hm", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32515", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32453", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32387", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039011", "reference_id": "2039011", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039011" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4185" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61363?format=api", "vulnerability_id": "VCID-tvmn-b999-xya7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18238", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18056", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19081", "reference_id": "19081", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19081" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210829", "reference_id": "2210829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210829" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json", "reference_id": "CVE-2023-2858.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html", "reference_id": "wnpa-sec-2023-15.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2858" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96386?format=api", "vulnerability_id": "VCID-tyxd-yfmx-z7d7", "summary": "SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23333", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2355", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19559", "reference_id": "19559", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19559" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html", "reference_id": "wnpa-sec-2024-10.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-8645" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78128?format=api", "vulnerability_id": "VCID-u22d-aazu-6khn", "summary": "wireshark: DoS (infinite loop) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01367", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01365", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235812", "reference_id": "2235812", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235812" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4511" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77870?format=api", "vulnerability_id": "VCID-vbn8-ghgq-n7g1", "summary": "wireshark: DOCSIS dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24079", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24146", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24294", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19557", "reference_id": "19557", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19557" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256652", "reference_id": "2256652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256652" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html", "reference_id": "wnpa-sec-2024-05.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0211" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32097?format=api", "vulnerability_id": "VCID-whve-rre4-fbgr", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.5395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54004", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54051", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54033", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54016", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039009", "reference_id": "2039009", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039009" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4184" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=api", "vulnerability_id": "VCID-wqn1-t4m4-wben", "summary": "Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0273", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20944", "reference_id": "20944", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20944" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762", "reference_id": "2429762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html", "reference_id": "wnpa-sec-2026-04.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-0960" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61354?format=api", "vulnerability_id": "VCID-ycu3-e7vh-2qc4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.8021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80238", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19087", "reference_id": "19087", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210835", "reference_id": "2210835", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210835" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0668.html", "reference_id": "CVE-2023-0668.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0668.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "reference_id": "wireshark-4.0.6.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-19.html", "reference_id": "wnpa-sec-2023-19.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-19.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0668" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80888?format=api", "vulnerability_id": "VCID-1uq1-jjn7-g3a7", "summary": "wireshark: TCP dissector crash (wnpa-sec-2020-12)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25862.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5297", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53037", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5303", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53064", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53048", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886041", "reference_id": "1886041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886041" }, { "reference_url": "https://usn.ubuntu.com/6262-1/", "reference_id": "USN-6262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6262-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-25862" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1uq1-jjn7-g3a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39234?format=api", "vulnerability_id": "VCID-4vfa-7p4k-43cd", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82838", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82863", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82888", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82896", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82911", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82906", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01829", "scoring_system": "epss", "scoring_elements": "0.82903", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839874", "reference_id": "1839874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839874" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" }, { "reference_url": "https://usn.ubuntu.com/6262-1/", "reference_id": "USN-6262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6262-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-13164" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vfa-7p4k-43cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32101?format=api", "vulnerability_id": "VCID-5xwx-39yu-7uf4", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22235.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73313", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73392", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73372", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73323", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73346", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00762", "scoring_system": "epss", "scoring_elements": "0.73369", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001872", "reference_id": "2001872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001872" }, { "reference_url": "https://security.archlinux.org/ASA-202107-44", "reference_id": "ASA-202107-44", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-44" }, { "reference_url": "https://security.archlinux.org/AVG-2160", "reference_id": "AVG-2160", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2160" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22235" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xwx-39yu-7uf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80828?format=api", "vulnerability_id": "VCID-6fe6-kurv-juc2", "summary": "wireshark: malformed packet on wire could make GQUIC protocol dissector loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77623", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.7763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.7764", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01065", "scoring_system": "epss", "scoring_elements": "0.77673", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893110", "reference_id": "1893110", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893110" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689", "reference_id": "974689", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689" }, { "reference_url": "https://security.archlinux.org/ASA-202011-13", "reference_id": "ASA-202011-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-13" }, { "reference_url": "https://security.archlinux.org/AVG-1258", "reference_id": "AVG-1258", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1258" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-28030" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fe6-kurv-juc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32107?format=api", "vulnerability_id": "VCID-6j8g-t9x7-3kg2", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76218", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76284", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7628", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025672", "reference_id": "2025672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025672" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39926" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6j8g-t9x7-3kg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37351?format=api", "vulnerability_id": "VCID-7jda-z5mm-duh7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.60886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61024", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.60958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.60988", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.60953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00405", "scoring_system": "epss", "scoring_elements": "0.61017", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919912", "reference_id": "1919912", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919912" }, { "reference_url": "https://security.archlinux.org/AVG-1352", "reference_id": "AVG-1352", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1352" }, { "reference_url": "https://security.gentoo.org/glsa/202101-12", "reference_id": "GLSA-202101-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-26418" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jda-z5mm-duh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32105?format=api", "vulnerability_id": "VCID-87w2-12tn-fud7", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.80016", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.8", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79949", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.7997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01337", "scoring_system": "epss", "scoring_elements": "0.79996", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025668", "reference_id": "2025668", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025668" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39924" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-87w2-12tn-fud7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80890?format=api", "vulnerability_id": "VCID-8ab7-hs6k-puan", "summary": "wireshark: BLIP dissector crash (wnpa-sec-2020-13)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79791", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79807", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79836", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79844", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01315", "scoring_system": "epss", "scoring_elements": "0.79841", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886051", "reference_id": "1886051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886051" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-25866" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ab7-hs6k-puan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32102?format=api", "vulnerability_id": "VCID-8wq4-n82v-pucg", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67029", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66961", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67023", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025653", "reference_id": "2025653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025653" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39920" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wq4-n82v-pucg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61338?format=api", "vulnerability_id": "VCID-am55-5vja-nffg", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22222.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22222.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4065", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40649", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4062", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001867", "reference_id": "2001867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001867" }, { "reference_url": "https://security.archlinux.org/ASA-202106-30", "reference_id": "ASA-202106-30", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-30" }, { "reference_url": "https://security.archlinux.org/AVG-2037", "reference_id": "AVG-2037", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2037" }, { "reference_url": "https://security.gentoo.org/glsa/202107-21", "reference_id": "GLSA-202107-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22222" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-am55-5vja-nffg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32104?format=api", "vulnerability_id": "VCID-bte7-m2d2-sbar", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89227", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.8925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89267", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89272", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025665", "reference_id": "2025665", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025665" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39922" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bte7-m2d2-sbar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59295?format=api", "vulnerability_id": "VCID-cwfd-d1xv-1fhe", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26575.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84479", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.845", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84521", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.8454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02233", "scoring_system": "epss", "scoring_elements": "0.84536", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886047", "reference_id": "1886047", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886047" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974688", "reference_id": "974688", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974688" }, { "reference_url": "https://security.gentoo.org/glsa/202011-08", "reference_id": "GLSA-202011-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-26575" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfd-d1xv-1fhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39237?format=api", "vulnerability_id": "VCID-czva-ymjk-8qfn", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69016", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69083", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.6911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69081", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828780", "reference_id": "1828780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828780" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-9429" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czva-ymjk-8qfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32103?format=api", "vulnerability_id": "VCID-d6d5-wvzh-1uet", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.8002", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80028", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80024", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025662", "reference_id": "2025662", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025662" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39921" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d6d5-wvzh-1uet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81669?format=api", "vulnerability_id": "VCID-ehzy-8yet-g3fz", "summary": "wireshark: invalid memory access in BT ATT dissector", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7045.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7045.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7045", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47574", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47634", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7045" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798671", "reference_id": "1798671", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798671" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-7045" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ehzy-8yet-g3fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82305?format=api", "vulnerability_id": "VCID-fe3n-22be-cfc1", "summary": "wireshark: CMS dissector crash (wnpa-sec-2019-22)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70973", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.7099", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.71005", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.71028", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.71012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70995", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782988", "reference_id": "1782988", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1782988" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2019-19553" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fe3n-22be-cfc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61335?format=api", "vulnerability_id": "VCID-gbxm-9qd8-dbh4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40866", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40922", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40903", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40952", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922465", "reference_id": "1922465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922465" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791", "reference_id": "981791", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791" }, { "reference_url": "https://security.archlinux.org/ASA-202102-3", "reference_id": "ASA-202102-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-3" }, { "reference_url": "https://security.archlinux.org/AVG-1510", "reference_id": "AVG-1510", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1510" }, { "reference_url": "https://security.gentoo.org/glsa/202107-21", "reference_id": "GLSA-202107-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22174" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbxm-9qd8-dbh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39239?format=api", "vulnerability_id": "VCID-gpjx-7syp-2yc7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03608", "scoring_system": "epss", "scoring_elements": "0.87782", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814615", "reference_id": "1814615", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814615" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-9430" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjx-7syp-2yc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61334?format=api", "vulnerability_id": "VCID-h87k-w6dk-bqfy", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22173.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22173.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22173", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65834", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65875", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65934", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22173" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922467", "reference_id": "1922467", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922467" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791", "reference_id": "981791", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791" }, { "reference_url": "https://security.archlinux.org/ASA-202102-3", "reference_id": "ASA-202102-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-3" }, { "reference_url": "https://security.archlinux.org/AVG-1510", "reference_id": "AVG-1510", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1510" }, { "reference_url": "https://security.gentoo.org/glsa/202107-21", "reference_id": "GLSA-202107-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22173" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h87k-w6dk-bqfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61337?format=api", "vulnerability_id": "VCID-hgjv-hfcn-b3hk", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64503", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64625", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64613", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0047", "scoring_system": "epss", "scoring_elements": "0.64608", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952964", "reference_id": "1952964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952964" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987853", "reference_id": "987853", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987853" }, { "reference_url": "https://security.archlinux.org/AVG-1864", "reference_id": "AVG-1864", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1864" }, { "reference_url": "https://security.gentoo.org/glsa/202107-21", "reference_id": "GLSA-202107-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22207" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgjv-hfcn-b3hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37358?format=api", "vulnerability_id": "VCID-hmmj-jw2d-53cd", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62281", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62421", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62369", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62401", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919919", "reference_id": "1919919", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919919" }, { "reference_url": "https://security.archlinux.org/AVG-1352", "reference_id": "AVG-1352", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1352" }, { "reference_url": "https://security.gentoo.org/glsa/202101-12", "reference_id": "GLSA-202101-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-26420" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmj-jw2d-53cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51485?format=api", "vulnerability_id": "VCID-k427-1bka-byfx", "summary": "A vulnerability in Wireshark could lead to a Denial of Service\n condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17498.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45743", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45784", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45839", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.4586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.4583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45834", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868885", "reference_id": "1868885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868885" }, { "reference_url": "https://security.gentoo.org/glsa/202008-14", "reference_id": "GLSA-202008-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-14" }, { "reference_url": "https://usn.ubuntu.com/6262-1/", "reference_id": "USN-6262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6262-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-17498" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k427-1bka-byfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37352?format=api", "vulnerability_id": "VCID-krdu-8g4g-tbbm", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62281", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62369", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62421", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919917", "reference_id": "1919917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919917" }, { "reference_url": "https://security.archlinux.org/AVG-1352", "reference_id": "AVG-1352", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1352" }, { "reference_url": "https://security.gentoo.org/glsa/202101-12", "reference_id": "GLSA-202101-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-26419" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krdu-8g4g-tbbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81668?format=api", "vulnerability_id": "VCID-ksba-7n8u-m7fy", "summary": "wireshark: WASSP dissector crash (wnpa-sec-2020-01)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7044.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7044.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7044", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.7119", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.7251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72517", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00725", "scoring_system": "epss", "scoring_elements": "0.72549", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7044" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796459", "reference_id": "1796459", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796459" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-7044" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksba-7n8u-m7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79913?format=api", "vulnerability_id": "VCID-m91z-38xy-h3g6", "summary": "wireshark: PNRP dissector large loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39923.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.8451", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84525", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84547", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.8455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84597", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84592", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0225", "scoring_system": "epss", "scoring_elements": "0.84588", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025686", "reference_id": "2025686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025686" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39923" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m91z-38xy-h3g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37363?format=api", "vulnerability_id": "VCID-rxqs-mf12-jkcf", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27739", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27794", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27624", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2769", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27734", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919923", "reference_id": "1919923", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919923" }, { "reference_url": "https://security.archlinux.org/AVG-1352", "reference_id": "AVG-1352", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1352" }, { "reference_url": "https://security.gentoo.org/glsa/202101-12", "reference_id": "GLSA-202101-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-26421" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxqs-mf12-jkcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32106?format=api", "vulnerability_id": "VCID-tvz6-1mnb-3bbz", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89227", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.8925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89267", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04625", "scoring_system": "epss", "scoring_elements": "0.89272", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025670", "reference_id": "2025670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025670" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39925" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvz6-1mnb-3bbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39241?format=api", "vulnerability_id": "VCID-ua7j-jegt-w7au", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9431", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88947", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88974", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88992", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.88997", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.89009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.89004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04397", "scoring_system": "epss", "scoring_elements": "0.89003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814586", "reference_id": "1814586", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814586" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-9431" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua7j-jegt-w7au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32108?format=api", "vulnerability_id": "VCID-vw97-3475-wqaa", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.8002", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80028", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80024", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025675", "reference_id": "2025675", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025675" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39928" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw97-3475-wqaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61336?format=api", "vulnerability_id": "VCID-vxnv-5h57-2uhu", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22191.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22191.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22191", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50553", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50642", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.5068", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50605", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00272", "scoring_system": "epss", "scoring_elements": "0.50637", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941478", "reference_id": "1941478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941478" }, { "reference_url": "https://security.archlinux.org/ASA-202103-2", "reference_id": "ASA-202103-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202103-2" }, { "reference_url": "https://security.archlinux.org/AVG-1669", "reference_id": "AVG-1669", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1669" }, { "reference_url": "https://security.gentoo.org/glsa/202107-21", "reference_id": "GLSA-202107-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-22191" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxnv-5h57-2uhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39236?format=api", "vulnerability_id": "VCID-w8ha-2d3q-q3dz", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9428", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.9217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92194", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92199", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08184", "scoring_system": "epss", "scoring_elements": "0.92196", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9428" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814622", "reference_id": "1814622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814622" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-9428" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ha-2d3q-q3dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80889?format=api", "vulnerability_id": "VCID-wva9-tbc7-73a3", "summary": "wireshark: MIME multipart dissector crash (wnpa-sec-2020-11)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47834", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47856", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47805", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47853", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47877", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00246", "scoring_system": "epss", "scoring_elements": "0.47863", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886044", "reference_id": "1886044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886044" }, { "reference_url": "https://usn.ubuntu.com/6262-1/", "reference_id": "USN-6262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6262-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-25863" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wva9-tbc7-73a3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32109?format=api", "vulnerability_id": "VCID-xrrb-yszf-k3au", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.3532", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35544", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35496", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00149", "scoring_system": "epss", "scoring_elements": "0.35519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00159", "scoring_system": "epss", "scoring_elements": "0.36781", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-39929" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025678", "reference_id": "2025678", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025678" }, { "reference_url": "https://security.archlinux.org/AVG-2564", "reference_id": "AVG-2564", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2564" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2021-39929" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrrb-yszf-k3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82219?format=api", "vulnerability_id": "VCID-y7g1-vrbz-t3eu", "summary": "wireshark: gryphon dissector infinite loop (wnpa-sec-2019-21)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16319.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16319.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-16319", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72059", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72009", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72024", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-16319" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2019-21.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2019-21.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775149", "reference_id": "1775149", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775149" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16319", "reference_id": "CVE-2019-16319", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16319" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2019-16319" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7g1-vrbz-t3eu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39233?format=api", "vulnerability_id": "VCID-yx64-zwpx-pkg7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82119", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82092", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11647" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2020-07.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2020-07.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824157", "reference_id": "1824157", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824157" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213", "reference_id": "958213", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213" }, { "reference_url": "https://security.archlinux.org/ASA-202004-10", "reference_id": "ASA-202004-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-10" }, { "reference_url": "https://security.archlinux.org/AVG-1129", "reference_id": "AVG-1129", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1129" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11647", "reference_id": "CVE-2020-11647", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11647" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-11647" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx64-zwpx-pkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39235?format=api", "vulnerability_id": "VCID-yx6e-pvpm-2fh7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70231", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.7026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70237", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70283", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00631", "scoring_system": "epss", "scoring_elements": "0.70298", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854882", "reference_id": "1854882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854882" }, { "reference_url": "https://security.archlinux.org/ASA-202007-2", "reference_id": "ASA-202007-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202007-2" }, { "reference_url": "https://security.archlinux.org/AVG-1198", "reference_id": "AVG-1198", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1198" }, { "reference_url": "https://security.gentoo.org/glsa/202007-13", "reference_id": "GLSA-202007-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-13" }, { "reference_url": "https://usn.ubuntu.com/6262-1/", "reference_id": "USN-6262-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6262-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049083?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-18xy-vuns-eqcx" }, { "vulnerability": "VCID-1b6n-9bub-1ueu" }, { "vulnerability": "VCID-1dz1-t49g-47bx" }, { "vulnerability": "VCID-23d3-1z9s-r7ht" }, { "vulnerability": "VCID-2bjq-y76h-qbhd" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-436x-av41-43g4" }, { "vulnerability": "VCID-63pm-hact-8ybw" }, { "vulnerability": "VCID-6exv-jrtx-8yab" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-9b6w-s1cn-57hz" }, { "vulnerability": "VCID-a9rv-3ka3-67fr" }, { "vulnerability": "VCID-beux-z8f3-bbg4" }, { "vulnerability": "VCID-ce6b-zqtu-jkdt" }, { "vulnerability": "VCID-cvch-5rbz-gyah" }, { "vulnerability": "VCID-d1fd-fcrt-j7bj" }, { "vulnerability": "VCID-d95z-wdv1-yye6" }, { "vulnerability": "VCID-dc45-d39b-u7bt" }, { "vulnerability": "VCID-dy74-uv3r-x7bs" }, { "vulnerability": "VCID-eed3-ztv5-yqg9" }, { "vulnerability": "VCID-end1-k29u-m7g8" }, { "vulnerability": "VCID-eqkh-wnhk-5fdh" }, { "vulnerability": "VCID-fve5-m93p-vbf3" }, { "vulnerability": "VCID-g38d-wdq8-sfgv" }, { "vulnerability": "VCID-h36t-f662-4ufw" }, { "vulnerability": "VCID-h51a-cp8r-r3fx" }, { "vulnerability": "VCID-jka6-e5fr-rkcv" }, { "vulnerability": "VCID-jknb-n171-8udz" }, { "vulnerability": "VCID-k49z-j5v1-pkhf" }, { "vulnerability": "VCID-k6r8-3ckd-87bf" }, { "vulnerability": "VCID-kpe5-12b6-pbes" }, { "vulnerability": "VCID-ksm5-9amq-aqg1" }, { "vulnerability": "VCID-ktks-hvzs-c7ep" }, { "vulnerability": "VCID-ky3g-7wfh-v7fz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-ne4k-vht4-rue7" }, { "vulnerability": "VCID-p3ew-pwr9-7yek" }, { "vulnerability": "VCID-prdk-zfnn-cyg3" }, { "vulnerability": "VCID-prz6-jk3b-wbhw" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-r9dr-xdt4-vke2" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-s3e9-4cud-ufdn" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-sj7t-z4pv-7ucz" }, { "vulnerability": "VCID-t7vh-m6cf-rfef" }, { "vulnerability": "VCID-tk9u-gtk1-v3hm" }, { "vulnerability": "VCID-tvmn-b999-xya7" }, { "vulnerability": "VCID-tyxd-yfmx-z7d7" }, { "vulnerability": "VCID-u22d-aazu-6khn" }, { "vulnerability": "VCID-vbn8-ghgq-n7g1" }, { "vulnerability": "VCID-whve-rre4-fbgr" }, { "vulnerability": "VCID-wqn1-t4m4-wben" }, { "vulnerability": "VCID-ycu3-e7vh-2qc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" } ], "aliases": [ "CVE-2020-15466" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx6e-pvpm-2fh7" } ], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1" }