Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
Typeapk
Namespacealpine
Namewireshark
Version3.4.13-r0
Qualifiers
arch x86_64
distroversion v3.15
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1dz1-t49g-47bx
vulnerability_id VCID-1dz1-t49g-47bx
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0644
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06483
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06477
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0646
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
reference_id 2054047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2022-0586
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx
1
url VCID-436x-av41-43g4
vulnerability_id VCID-436x-av41-43g4
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15607
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1565
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15714
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15485
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15572
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15627
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15591
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15555
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.1549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
reference_id 2054049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2022-0585
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4
2
url VCID-63pm-hact-8ybw
vulnerability_id VCID-63pm-hact-8ybw
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-13T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-11T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22511
published_at 2026-04-12T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-02T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2261
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-07T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22478
published_at 2026-04-08T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-09T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
reference_id 2054059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2022-0581
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw
3
url VCID-6j8g-t9x7-3kg2
vulnerability_id VCID-6j8g-t9x7-3kg2
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39926
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76218
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-13T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-11T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-12T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76222
published_at 2026-04-02T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76254
published_at 2026-04-04T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76234
published_at 2026-04-07T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76266
published_at 2026-04-08T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025672
reference_id 2025672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025672
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39926
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6j8g-t9x7-3kg2
4
url VCID-87w2-12tn-fud7
vulnerability_id VCID-87w2-12tn-fud7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39924
reference_id
reference_type
scores
0
value 0.01337
scoring_system epss
scoring_elements 0.79942
published_at 2026-04-01T12:55:00Z
1
value 0.01337
scoring_system epss
scoring_elements 0.79992
published_at 2026-04-13T12:55:00Z
2
value 0.01337
scoring_system epss
scoring_elements 0.80016
published_at 2026-04-11T12:55:00Z
3
value 0.01337
scoring_system epss
scoring_elements 0.8
published_at 2026-04-12T12:55:00Z
4
value 0.01337
scoring_system epss
scoring_elements 0.79949
published_at 2026-04-02T12:55:00Z
5
value 0.01337
scoring_system epss
scoring_elements 0.7997
published_at 2026-04-04T12:55:00Z
6
value 0.01337
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-07T12:55:00Z
7
value 0.01337
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-08T12:55:00Z
8
value 0.01337
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025668
reference_id 2025668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025668
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39924
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87w2-12tn-fud7
5
url VCID-8wq4-n82v-pucg
vulnerability_id VCID-8wq4-n82v-pucg
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39920
reference_id
reference_type
scores
0
value 0.00525
scoring_system epss
scoring_elements 0.66923
published_at 2026-04-01T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.66998
published_at 2026-04-13T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.67043
published_at 2026-04-11T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.67029
published_at 2026-04-12T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.66961
published_at 2026-04-07T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.66987
published_at 2026-04-04T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-08T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67023
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39920
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025653
reference_id 2025653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025653
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39920
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wq4-n82v-pucg
6
url VCID-bte7-m2d2-sbar
vulnerability_id VCID-bte7-m2d2-sbar
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39922
reference_id
reference_type
scores
0
value 0.04625
scoring_system epss
scoring_elements 0.89227
published_at 2026-04-01T12:55:00Z
1
value 0.04625
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-13T12:55:00Z
2
value 0.04625
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-11T12:55:00Z
3
value 0.04625
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-12T12:55:00Z
4
value 0.04625
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-02T12:55:00Z
5
value 0.04625
scoring_system epss
scoring_elements 0.89247
published_at 2026-04-04T12:55:00Z
6
value 0.04625
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-07T12:55:00Z
7
value 0.04625
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-08T12:55:00Z
8
value 0.04625
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025665
reference_id 2025665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025665
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39922
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bte7-m2d2-sbar
7
url VCID-ce6b-zqtu-jkdt
vulnerability_id VCID-ce6b-zqtu-jkdt
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20269
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20329
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20133
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20215
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
reference_id 2054056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2022-0582
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt
8
url VCID-d6d5-wvzh-1uet
vulnerability_id VCID-d6d5-wvzh-1uet
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39921
reference_id
reference_type
scores
0
value 0.01341
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-01T12:55:00Z
1
value 0.01341
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-13T12:55:00Z
2
value 0.01341
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-11T12:55:00Z
3
value 0.01341
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-12T12:55:00Z
4
value 0.01341
scoring_system epss
scoring_elements 0.79975
published_at 2026-04-02T12:55:00Z
5
value 0.01341
scoring_system epss
scoring_elements 0.79997
published_at 2026-04-04T12:55:00Z
6
value 0.01341
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-07T12:55:00Z
7
value 0.01341
scoring_system epss
scoring_elements 0.80015
published_at 2026-04-08T12:55:00Z
8
value 0.01341
scoring_system epss
scoring_elements 0.80024
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025662
reference_id 2025662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025662
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39921
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6d5-wvzh-1uet
9
url VCID-eqkh-wnhk-5fdh
vulnerability_id VCID-eqkh-wnhk-5fdh
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32147
published_at 2026-04-01T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32279
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32141
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32218
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-12T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32149
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
reference_id 2039013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-4186
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh
10
url VCID-ktks-hvzs-c7ep
vulnerability_id VCID-ktks-hvzs-c7ep
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12846
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12898
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12703
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12834
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12763
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12716
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
reference_id 2039005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-4182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep
11
url VCID-ky3g-7wfh-v7fz
vulnerability_id VCID-ky3g-7wfh-v7fz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39516
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39455
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39525
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39536
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39498
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39481
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
reference_id 2039000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-4181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz
12
url VCID-ne4k-vht4-rue7
vulnerability_id VCID-ne4k-vht4-rue7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23229
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23313
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23334
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23239
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
reference_id 2054051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2022-0583
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7
13
url VCID-tk9u-gtk1-v3hm
vulnerability_id VCID-tk9u-gtk1-v3hm
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32366
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32515
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3255
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32373
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32422
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32449
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32453
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32414
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32387
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
reference_id 2039011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-4185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm
14
url VCID-tvz6-1mnb-3bbz
vulnerability_id VCID-tvz6-1mnb-3bbz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39925
reference_id
reference_type
scores
0
value 0.04625
scoring_system epss
scoring_elements 0.89227
published_at 2026-04-01T12:55:00Z
1
value 0.04625
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-13T12:55:00Z
2
value 0.04625
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-11T12:55:00Z
3
value 0.04625
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-12T12:55:00Z
4
value 0.04625
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-02T12:55:00Z
5
value 0.04625
scoring_system epss
scoring_elements 0.89247
published_at 2026-04-04T12:55:00Z
6
value 0.04625
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-07T12:55:00Z
7
value 0.04625
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-08T12:55:00Z
8
value 0.04625
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025670
reference_id 2025670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025670
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39925
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvz6-1mnb-3bbz
15
url VCID-vw97-3475-wqaa
vulnerability_id VCID-vw97-3475-wqaa
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39928
reference_id
reference_type
scores
0
value 0.01341
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-01T12:55:00Z
1
value 0.01341
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-13T12:55:00Z
2
value 0.01341
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-11T12:55:00Z
3
value 0.01341
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-12T12:55:00Z
4
value 0.01341
scoring_system epss
scoring_elements 0.79975
published_at 2026-04-02T12:55:00Z
5
value 0.01341
scoring_system epss
scoring_elements 0.79997
published_at 2026-04-04T12:55:00Z
6
value 0.01341
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-07T12:55:00Z
7
value 0.01341
scoring_system epss
scoring_elements 0.80015
published_at 2026-04-08T12:55:00Z
8
value 0.01341
scoring_system epss
scoring_elements 0.80024
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025675
reference_id 2025675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025675
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39928
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw97-3475-wqaa
16
url VCID-whve-rre4-fbgr
vulnerability_id VCID-whve-rre4-fbgr
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53933
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5395
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53953
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54033
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
reference_id 2039009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-4184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr
17
url VCID-xrrb-yszf-k3au
vulnerability_id VCID-xrrb-yszf-k3au
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39929
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.3532
published_at 2026-04-01T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35426
published_at 2026-04-07T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35544
published_at 2026-04-04T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35472
published_at 2026-04-08T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35496
published_at 2026-04-09T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35507
published_at 2026-04-11T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35519
published_at 2026-04-02T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36756
published_at 2026-04-13T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36781
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025678
reference_id 2025678
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025678
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
18
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/wireshark@3.4.13-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-39929
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrrb-yszf-k3au
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@3.4.13-r0%3Farch=x86_64&distroversion=v3.15&reponame=community