Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/wireshark-cli@3.4.0-1
Typealpm
Namespacearchlinux
Namewireshark-cli
Version3.4.0-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.4.3-1
Latest_non_vulnerable_version3.4.10-1
Affected_by_vulnerabilities
0
url VCID-7jda-z5mm-duh7
vulnerability_id VCID-7jda-z5mm-duh7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26418
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.60886
published_at 2026-04-01T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.61004
published_at 2026-04-13T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.61039
published_at 2026-04-11T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-12T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-02T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.60988
published_at 2026-04-04T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.60953
published_at 2026-04-07T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61001
published_at 2026-04-08T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61017
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919912
reference_id 1919912
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919912
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:alpm/archlinux/wireshark-cli@3.4.1-1
purl pkg:alpm/archlinux/wireshark-cli@3.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-j5fv-hrep-fbe4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.1-1
aliases CVE-2020-26418
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jda-z5mm-duh7
1
url VCID-hmmj-jw2d-53cd
vulnerability_id VCID-hmmj-jw2d-53cd
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26420
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62281
published_at 2026-04-01T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-13T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-11T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62411
published_at 2026-04-12T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-02T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-04T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-07T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-08T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62401
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919919
reference_id 1919919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919919
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:alpm/archlinux/wireshark-cli@3.4.1-1
purl pkg:alpm/archlinux/wireshark-cli@3.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-j5fv-hrep-fbe4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.1-1
aliases CVE-2020-26420
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmj-jw2d-53cd
2
url VCID-krdu-8g4g-tbbm
vulnerability_id VCID-krdu-8g4g-tbbm
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26419
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62281
published_at 2026-04-01T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-02T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-04T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-07T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-08T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62401
published_at 2026-04-09T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-11T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62411
published_at 2026-04-12T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919917
reference_id 1919917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919917
4
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
5
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:alpm/archlinux/wireshark-cli@3.4.1-1
purl pkg:alpm/archlinux/wireshark-cli@3.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-j5fv-hrep-fbe4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.1-1
aliases CVE-2020-26419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krdu-8g4g-tbbm
3
url VCID-rxqs-mf12-jkcf
vulnerability_id VCID-rxqs-mf12-jkcf
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26421
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27753
published_at 2026-04-01T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27637
published_at 2026-04-13T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27739
published_at 2026-04-11T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27695
published_at 2026-04-12T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27794
published_at 2026-04-02T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27833
published_at 2026-04-04T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27624
published_at 2026-04-07T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.2769
published_at 2026-04-08T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27734
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919923
reference_id 1919923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919923
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:alpm/archlinux/wireshark-cli@3.4.1-1
purl pkg:alpm/archlinux/wireshark-cli@3.4.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-j5fv-hrep-fbe4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.1-1
aliases CVE-2020-26421
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxqs-mf12-jkcf
Fixing_vulnerabilities
0
url VCID-6fe6-kurv-juc2
vulnerability_id VCID-6fe6-kurv-juc2
summary wireshark: malformed packet on wire could make GQUIC protocol dissector loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28030
reference_id
reference_type
scores
0
value 0.01065
scoring_system epss
scoring_elements 0.77623
published_at 2026-04-01T12:55:00Z
1
value 0.01065
scoring_system epss
scoring_elements 0.77682
published_at 2026-04-13T12:55:00Z
2
value 0.01065
scoring_system epss
scoring_elements 0.77699
published_at 2026-04-11T12:55:00Z
3
value 0.01065
scoring_system epss
scoring_elements 0.77683
published_at 2026-04-12T12:55:00Z
4
value 0.01065
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-02T12:55:00Z
5
value 0.01065
scoring_system epss
scoring_elements 0.77657
published_at 2026-04-04T12:55:00Z
6
value 0.01065
scoring_system epss
scoring_elements 0.7764
published_at 2026-04-07T12:55:00Z
7
value 0.01065
scoring_system epss
scoring_elements 0.77668
published_at 2026-04-08T12:55:00Z
8
value 0.01065
scoring_system epss
scoring_elements 0.77673
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1893110
reference_id 1893110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1893110
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689
reference_id 974689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689
6
reference_url https://security.archlinux.org/ASA-202011-13
reference_id ASA-202011-13
reference_type
scores
url https://security.archlinux.org/ASA-202011-13
7
reference_url https://security.archlinux.org/AVG-1258
reference_id AVG-1258
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1258
fixed_packages
0
url pkg:alpm/archlinux/wireshark-cli@3.4.0-1
purl pkg:alpm/archlinux/wireshark-cli@3.4.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7jda-z5mm-duh7
1
vulnerability VCID-hmmj-jw2d-53cd
2
vulnerability VCID-krdu-8g4g-tbbm
3
vulnerability VCID-rxqs-mf12-jkcf
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.0-1
aliases CVE-2020-28030
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fe6-kurv-juc2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/wireshark-cli@3.4.0-1