Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/396536?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "type": "apk", "namespace": "alpine", "name": "wireshark", "version": "2.2.15-r0", "qualifiers": { "arch": "aarch64", "distroversion": "v3.6", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83669?format=api", "vulnerability_id": "VCID-1her-1nh5-57cx", "summary": "wireshark: SIGCOMP dissector crash in packet-sigcomp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.7703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549305", "reference_id": "1549305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1047", "reference_id": "RHSA-2020:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1047" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7418" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93779?format=api", "vulnerability_id": "VCID-1ndt-2ndw-mug2", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67557", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67547", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7323" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83477?format=api", "vulnerability_id": "VCID-6u5q-6d7a-ekd3", "summary": "wireshark: Uncontrolled Resource Consumption in epan/tvbuff.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78689", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.7874", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78695", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78726", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78733", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11357" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-28.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581771", "reference_id": "1581771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11357", "reference_id": "CVE-2018-11357", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11357" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11357" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u5q-6d7a-ekd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83478?format=api", "vulnerability_id": "VCID-99mf-vasd-6qfa", "summary": "wireshark: Heap-based Buffer Overflow in packet-gsm_a_dtap.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77976", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77927", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.7793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77941", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77889", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0109", "scoring_system": "epss", "scoring_elements": "0.77899", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11360" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4217" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-30.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-30.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581781", "reference_id": "1581781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11360", "reference_id": "CVE-2018-11360", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11360" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11360" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99mf-vasd-6qfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93785?format=api", "vulnerability_id": "VCID-9g71-v5zu-tqg3", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7329", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57847", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7329" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93786?format=api", "vulnerability_id": "VCID-9xr3-ty4u-ekeh", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7330", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57847", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7330" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83681?format=api", "vulnerability_id": "VCID-a6fx-tsy1-tuc1", "summary": "wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71951", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71997", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72005", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7203", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549277", "reference_id": "1549277", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549277" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7320" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73551?format=api", "vulnerability_id": "VCID-ap24-btqx-j7eb", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.7703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549255", "reference_id": "1549255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549255" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7334" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83668?format=api", "vulnerability_id": "VCID-ardp-y1tu-t7fb", "summary": "wireshark: IPMI dissector crash in packet-ipmi-picmg.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60761", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60821", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549301", "reference_id": "1549301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549301" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7417" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93787?format=api", "vulnerability_id": "VCID-bhf2-h1h2-tybb", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7331", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79756", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79679", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79707", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79692", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79721", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01301", "scoring_system": "epss", "scoring_elements": "0.79727", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7331" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83476?format=api", "vulnerability_id": "VCID-bs39-fprw-dkft", "summary": "wireshark: DNS dissector crash in packet-dns.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.7872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78758", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.7874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78766", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11356" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-29.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-29.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581768", "reference_id": "1581768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11356", "reference_id": "CVE-2018-11356", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11356" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11356" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bs39-fprw-dkft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93780?format=api", "vulnerability_id": "VCID-cpjt-28ch-tub3", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7324", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67557", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67547", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7324" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83450?format=api", "vulnerability_id": "VCID-e491-5pe9-rbe6", "summary": "wireshark: Out-of-bounds Read in proto.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11359", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78776", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78855", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.7883", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78784", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78815", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0119", "scoring_system": "epss", "scoring_elements": "0.78823", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11359" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-33.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-33.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581778", "reference_id": "1581778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581778" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11359", "reference_id": "CVE-2018-11359", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11359" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11359" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e491-5pe9-rbe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73555?format=api", "vulnerability_id": "VCID-eb2u-sghj-yqhp", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81568", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81566", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11358" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4217" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-31.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-31.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581773", "reference_id": "1581773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581773" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11358", "reference_id": "CVE-2018-11358", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11358" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11358" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eb2u-sghj-yqhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83673?format=api", "vulnerability_id": "VCID-er4n-qs89-83ce", "summary": "wireshark: Pcapng file parser crash in pcapng.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.837", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83733", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549284", "reference_id": "1549284", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549284" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7420" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93783?format=api", "vulnerability_id": "VCID-k15e-aq9v-5bg7", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7327", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57847", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7327" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7327" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93778?format=api", "vulnerability_id": "VCID-kv7a-jf9y-q7dt", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67557", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67594", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67547", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7322" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93784?format=api", "vulnerability_id": "VCID-qmm9-abhm-4baz", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7328", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57847", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7328" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7328" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93777?format=api", "vulnerability_id": "VCID-qrsq-8eac-nfbw", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62348", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62404", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62477", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62455", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7321" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73552?format=api", "vulnerability_id": "VCID-r8qg-5qpe-wka7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.76988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.7703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01005", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549244", "reference_id": "1549244", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549244" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7335" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93781?format=api", "vulnerability_id": "VCID-v27j-rsag-73ce", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59221", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.5915", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59204", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59185", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7325" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73556?format=api", "vulnerability_id": "VCID-v8cp-tsyw-skeq", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81568", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81566", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11362" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4217" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-25.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-25.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581787", "reference_id": "1581787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581787" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708", "reference_id": "900708", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11362", "reference_id": "CVE-2018-11362", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1047", "reference_id": "RHSA-2020:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1047" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-11362" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8cp-tsyw-skeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73553?format=api", "vulnerability_id": "VCID-waws-7w8j-m7cv", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83672", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.837", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83733", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83742", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02017", "scoring_system": "epss", "scoring_elements": "0.83772", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549308", "reference_id": "1549308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549308" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7419" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93789?format=api", "vulnerability_id": "VCID-wdq7-4pvq-nbdf", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7333", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57872", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57873", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57847", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7333" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93788?format=api", "vulnerability_id": "VCID-xhuq-918m-wket", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58952", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59049", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59066", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59072", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5909", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59053", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7332" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83696?format=api", "vulnerability_id": "VCID-yug7-qj7h-7bfb", "summary": "wireshark: FCP dissector crash in packet-fcp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77093", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77068", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01008", "scoring_system": "epss", "scoring_elements": "0.77109", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549270", "reference_id": "1549270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549270" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7336" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93782?format=api", "vulnerability_id": "VCID-zb31-abbp-2yfp", "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59963", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59801", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59873", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59936", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00388", "scoring_system": "epss", "scoring_elements": "0.59924", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/396536?format=api", "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=aarch64&distroversion=v3.6&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" } ], "aliases": [ "CVE-2018-7326" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=aarch64&distroversion=v3.6&reponame=community" }