Lookup for vulnerable packages by Package URL.

GET /api/packages/396539?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "wireshark",
    "version": "2.2.15-r0",
    "qualifiers": {
        "arch": "s390x",
        "distroversion": "v3.6",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83669?format=api",
            "vulnerability_id": "VCID-1her-1nh5-57cx",
            "summary": "wireshark: SIGCOMP dissector crash in packet-sigcomp.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7418",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76971",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76988",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77058",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7418"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549305",
                    "reference_id": "1549305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549305"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1047",
                    "reference_id": "RHSA-2020:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1047"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7418"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93779?format=api",
            "vulnerability_id": "VCID-1ndt-2ndw-mug2",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67582",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67527",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67557",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67547",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7323"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83477?format=api",
            "vulnerability_id": "VCID-6u5q-6d7a-ekd3",
            "summary": "wireshark: Uncontrolled Resource Consumption in epan/tvbuff.c",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78689",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78767",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7874",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78765",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78695",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78726",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78733",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11357"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-28.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-28.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581771",
                    "reference_id": "1581771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11357",
                    "reference_id": "CVE-2018-11357",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11357"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11357"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u5q-6d7a-ekd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83478?format=api",
            "vulnerability_id": "VCID-99mf-vasd-6qfa",
            "summary": "wireshark: Heap-based Buffer Overflow in packet-gsm_a_dtap.c",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77882",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77976",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77927",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7793",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77957",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77941",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77889",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77917",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77899",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11360"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4217"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-30.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-30.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581781",
                    "reference_id": "1581781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581781"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11360",
                    "reference_id": "CVE-2018-11360",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11360"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11360"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99mf-vasd-6qfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93785?format=api",
            "vulnerability_id": "VCID-9g71-v5zu-tqg3",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7329",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57847",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7329"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7329"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93786?format=api",
            "vulnerability_id": "VCID-9xr3-ty4u-ekeh",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57847",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7330"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83681?format=api",
            "vulnerability_id": "VCID-a6fx-tsy1-tuc1",
            "summary": "wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71943",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7197",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71947",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71997",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72021",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72005",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7203",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7320"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549277",
                    "reference_id": "1549277",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549277"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7320"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73551?format=api",
            "vulnerability_id": "VCID-ap24-btqx-j7eb",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76971",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76988",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77058",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549255",
                    "reference_id": "1549255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549255"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7334"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83668?format=api",
            "vulnerability_id": "VCID-ardp-y1tu-t7fb",
            "summary": "wireshark: IPMI dissector crash in packet-ipmi-picmg.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60658",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60731",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60761",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60726",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6079",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60811",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60797",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60779",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60821",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549301",
                    "reference_id": "1549301",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549301"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7417"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93787?format=api",
            "vulnerability_id": "VCID-bhf2-h1h2-tybb",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79756",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79679",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79686",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79707",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79692",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79721",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79733",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79727",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7331"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83476?format=api",
            "vulnerability_id": "VCID-bs39-fprw-dkft",
            "summary": "wireshark: DNS dissector crash  in packet-dns.c",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7872",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78773",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78797",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78779",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78758",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7874",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78766",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11356"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-29.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-29.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581768",
                    "reference_id": "1581768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11356",
                    "reference_id": "CVE-2018-11356",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11356"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11356"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bs39-fprw-dkft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93780?format=api",
            "vulnerability_id": "VCID-cpjt-28ch-tub3",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67582",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67527",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67557",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67547",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7324"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83450?format=api",
            "vulnerability_id": "VCID-e491-5pe9-rbe6",
            "summary": "wireshark: Out-of-bounds Read in proto.c",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78776",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78855",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7883",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78853",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78827",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78784",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78815",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78798",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78823",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11359"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-33.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-33.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581778",
                    "reference_id": "1581778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581778"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11359",
                    "reference_id": "CVE-2018-11359",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11359"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11359"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e491-5pe9-rbe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73555?format=api",
            "vulnerability_id": "VCID-eb2u-sghj-yqhp",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81535",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81637",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81568",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81566",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11358"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4217"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-31.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-31.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581773",
                    "reference_id": "1581773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11358",
                    "reference_id": "CVE-2018-11358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11358"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11358"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eb2u-sghj-yqhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83673?format=api",
            "vulnerability_id": "VCID-er4n-qs89-83ce",
            "summary": "wireshark: Pcapng file parser crash in pcapng.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83685",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.837",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83726",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83733",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83742",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83772",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549284",
                    "reference_id": "1549284",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549284"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7420"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93783?format=api",
            "vulnerability_id": "VCID-k15e-aq9v-5bg7",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57847",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7327"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7327"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93778?format=api",
            "vulnerability_id": "VCID-kv7a-jf9y-q7dt",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67582",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67527",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67557",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67547",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7322"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93784?format=api",
            "vulnerability_id": "VCID-qmm9-abhm-4baz",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57847",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7328"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7328"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93777?format=api",
            "vulnerability_id": "VCID-qrsq-8eac-nfbw",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.625",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62348",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62407",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62438",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62404",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62477",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62455",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7321"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73552?format=api",
            "vulnerability_id": "VCID-r8qg-5qpe-wka7",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76971",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76988",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77058",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549244",
                    "reference_id": "1549244",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549244"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7335"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93781?format=api",
            "vulnerability_id": "VCID-v27j-rsag-73ce",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59221",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59077",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5915",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59174",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59185",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7325"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73556?format=api",
            "vulnerability_id": "VCID-v8cp-tsyw-skeq",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81535",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81637",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81568",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81566",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11362"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4217"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-25.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2018-25.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104308"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581787",
                    "reference_id": "1581787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581787"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708",
                    "reference_id": "900708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-23",
                    "reference_id": "ASA-201805-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-25",
                    "reference_id": "ASA-201805-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-708",
                    "reference_id": "AVG-708",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11362",
                    "reference_id": "CVE-2018-11362",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1047",
                    "reference_id": "RHSA-2020:1047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1047"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-11362"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8cp-tsyw-skeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73553?format=api",
            "vulnerability_id": "VCID-waws-7w8j-m7cv",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83672",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83685",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.837",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83726",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83733",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83742",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83772",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549308",
                    "reference_id": "1549308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549308"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7419"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93789?format=api",
            "vulnerability_id": "VCID-wdq7-4pvq-nbdf",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57843",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57817",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57872",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57873",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57847",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7333"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93788?format=api",
            "vulnerability_id": "VCID-xhuq-918m-wket",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59088",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58952",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59027",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59049",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59015",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59072",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5909",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59053",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7332"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83696?format=api",
            "vulnerability_id": "VCID-yug7-qj7h-7bfb",
            "summary": "wireshark: FCP dissector crash in packet-fcp.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77022",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77065",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77093",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77068",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77109",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7336"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549270",
                    "reference_id": "1549270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549270"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7336"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93782?format=api",
            "vulnerability_id": "VCID-zb31-abbp-2yfp",
            "summary": "In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59963",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59801",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59903",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59873",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59923",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59936",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59958",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59942",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59924",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7326"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/396539?format=api",
                    "purl": "pkg:apk/alpine/wireshark@2.2.15-r0?arch=s390x&distroversion=v3.6&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2018-7326"
            ],
            "risk_score": 1.3,
            "exploitability": "0.5",
            "weighted_severity": "2.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=s390x&distroversion=v3.6&reponame=community"
}