Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-analyzer/wireshark@3.2.5
Typeebuild
Namespacenet-analyzer
Namewireshark
Version3.2.5
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.2.6
Latest_non_vulnerable_version4.0.11
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4vfa-7p4k-43cd
vulnerability_id VCID-4vfa-7p4k-43cd
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13164
reference_id
reference_type
scores
0
value 0.01829
scoring_system epss
scoring_elements 0.82838
published_at 2026-04-01T12:55:00Z
1
value 0.01829
scoring_system epss
scoring_elements 0.82854
published_at 2026-04-02T12:55:00Z
2
value 0.01829
scoring_system epss
scoring_elements 0.82867
published_at 2026-04-04T12:55:00Z
3
value 0.01829
scoring_system epss
scoring_elements 0.82863
published_at 2026-04-07T12:55:00Z
4
value 0.01829
scoring_system epss
scoring_elements 0.82888
published_at 2026-04-08T12:55:00Z
5
value 0.01829
scoring_system epss
scoring_elements 0.82896
published_at 2026-04-09T12:55:00Z
6
value 0.01829
scoring_system epss
scoring_elements 0.82911
published_at 2026-04-11T12:55:00Z
7
value 0.01829
scoring_system epss
scoring_elements 0.82906
published_at 2026-04-12T12:55:00Z
8
value 0.01829
scoring_system epss
scoring_elements 0.82903
published_at 2026-04-13T12:55:00Z
9
value 0.01829
scoring_system epss
scoring_elements 0.82942
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1839874
reference_id 1839874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1839874
5
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
6
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-13164
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vfa-7p4k-43cd
1
url VCID-czva-ymjk-8qfn
vulnerability_id VCID-czva-ymjk-8qfn
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9429
reference_id
reference_type
scores
0
value 0.00586
scoring_system epss
scoring_elements 0.69016
published_at 2026-04-01T12:55:00Z
1
value 0.00586
scoring_system epss
scoring_elements 0.69032
published_at 2026-04-02T12:55:00Z
2
value 0.00586
scoring_system epss
scoring_elements 0.69053
published_at 2026-04-04T12:55:00Z
3
value 0.00586
scoring_system epss
scoring_elements 0.69033
published_at 2026-04-07T12:55:00Z
4
value 0.00586
scoring_system epss
scoring_elements 0.69083
published_at 2026-04-08T12:55:00Z
5
value 0.00586
scoring_system epss
scoring_elements 0.69103
published_at 2026-04-09T12:55:00Z
6
value 0.00586
scoring_system epss
scoring_elements 0.69126
published_at 2026-04-11T12:55:00Z
7
value 0.00586
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-12T12:55:00Z
8
value 0.00586
scoring_system epss
scoring_elements 0.69081
published_at 2026-04-13T12:55:00Z
9
value 0.00586
scoring_system epss
scoring_elements 0.69121
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828780
reference_id 1828780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828780
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-9429
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czva-ymjk-8qfn
2
url VCID-gpjx-7syp-2yc7
vulnerability_id VCID-gpjx-7syp-2yc7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9430
reference_id
reference_type
scores
0
value 0.03608
scoring_system epss
scoring_elements 0.87724
published_at 2026-04-01T12:55:00Z
1
value 0.03608
scoring_system epss
scoring_elements 0.87735
published_at 2026-04-02T12:55:00Z
2
value 0.03608
scoring_system epss
scoring_elements 0.87748
published_at 2026-04-04T12:55:00Z
3
value 0.03608
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-07T12:55:00Z
4
value 0.03608
scoring_system epss
scoring_elements 0.87772
published_at 2026-04-08T12:55:00Z
5
value 0.03608
scoring_system epss
scoring_elements 0.87778
published_at 2026-04-09T12:55:00Z
6
value 0.03608
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-11T12:55:00Z
7
value 0.03608
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-12T12:55:00Z
8
value 0.03608
scoring_system epss
scoring_elements 0.87782
published_at 2026-04-13T12:55:00Z
9
value 0.03608
scoring_system epss
scoring_elements 0.87797
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814615
reference_id 1814615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814615
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-9430
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjx-7syp-2yc7
3
url VCID-ua7j-jegt-w7au
vulnerability_id VCID-ua7j-jegt-w7au
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9431
reference_id
reference_type
scores
0
value 0.04397
scoring_system epss
scoring_elements 0.88947
published_at 2026-04-01T12:55:00Z
1
value 0.04397
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-02T12:55:00Z
2
value 0.04397
scoring_system epss
scoring_elements 0.88971
published_at 2026-04-04T12:55:00Z
3
value 0.04397
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-07T12:55:00Z
4
value 0.04397
scoring_system epss
scoring_elements 0.88992
published_at 2026-04-08T12:55:00Z
5
value 0.04397
scoring_system epss
scoring_elements 0.88997
published_at 2026-04-09T12:55:00Z
6
value 0.04397
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-11T12:55:00Z
7
value 0.04397
scoring_system epss
scoring_elements 0.89004
published_at 2026-04-12T12:55:00Z
8
value 0.04397
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-13T12:55:00Z
9
value 0.04397
scoring_system epss
scoring_elements 0.89016
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814586
reference_id 1814586
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814586
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-9431
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua7j-jegt-w7au
4
url VCID-w8ha-2d3q-q3dz
vulnerability_id VCID-w8ha-2d3q-q3dz
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9428
reference_id
reference_type
scores
0
value 0.08184
scoring_system epss
scoring_elements 0.92163
published_at 2026-04-01T12:55:00Z
1
value 0.08184
scoring_system epss
scoring_elements 0.9217
published_at 2026-04-02T12:55:00Z
2
value 0.08184
scoring_system epss
scoring_elements 0.92176
published_at 2026-04-04T12:55:00Z
3
value 0.08184
scoring_system epss
scoring_elements 0.92179
published_at 2026-04-07T12:55:00Z
4
value 0.08184
scoring_system epss
scoring_elements 0.92191
published_at 2026-04-08T12:55:00Z
5
value 0.08184
scoring_system epss
scoring_elements 0.92194
published_at 2026-04-09T12:55:00Z
6
value 0.08184
scoring_system epss
scoring_elements 0.92199
published_at 2026-04-12T12:55:00Z
7
value 0.08184
scoring_system epss
scoring_elements 0.92196
published_at 2026-04-13T12:55:00Z
8
value 0.08184
scoring_system epss
scoring_elements 0.92207
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814622
reference_id 1814622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814622
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-9428
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ha-2d3q-q3dz
5
url VCID-yx64-zwpx-pkg7
vulnerability_id VCID-yx64-zwpx-pkg7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11647
reference_id
reference_type
scores
0
value 0.01672
scoring_system epss
scoring_elements 0.82063
published_at 2026-04-01T12:55:00Z
1
value 0.01672
scoring_system epss
scoring_elements 0.82165
published_at 2026-04-16T12:55:00Z
2
value 0.01672
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-09T12:55:00Z
3
value 0.01672
scoring_system epss
scoring_elements 0.82145
published_at 2026-04-11T12:55:00Z
4
value 0.01672
scoring_system epss
scoring_elements 0.82136
published_at 2026-04-12T12:55:00Z
5
value 0.01672
scoring_system epss
scoring_elements 0.82128
published_at 2026-04-13T12:55:00Z
6
value 0.01672
scoring_system epss
scoring_elements 0.82075
published_at 2026-04-02T12:55:00Z
7
value 0.01672
scoring_system epss
scoring_elements 0.82096
published_at 2026-04-04T12:55:00Z
8
value 0.01672
scoring_system epss
scoring_elements 0.82092
published_at 2026-04-07T12:55:00Z
9
value 0.01672
scoring_system epss
scoring_elements 0.82119
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11647
4
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
5
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
9
reference_url https://www.wireshark.org/security/wnpa-sec-2020-07.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2020-07.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824157
reference_id 1824157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824157
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213
reference_id 958213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213
12
reference_url https://security.archlinux.org/ASA-202004-10
reference_id ASA-202004-10
reference_type
scores
url https://security.archlinux.org/ASA-202004-10
13
reference_url https://security.archlinux.org/AVG-1129
reference_id AVG-1129
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1129
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11647
reference_id CVE-2020-11647
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11647
19
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-11647
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx64-zwpx-pkg7
6
url VCID-yx6e-pvpm-2fh7
vulnerability_id VCID-yx6e-pvpm-2fh7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15466
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70231
published_at 2026-04-01T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70335
published_at 2026-04-16T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70306
published_at 2026-04-12T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70293
published_at 2026-04-13T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-02T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.7026
published_at 2026-04-04T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70237
published_at 2026-04-07T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70283
published_at 2026-04-08T12:55:00Z
8
value 0.00631
scoring_system epss
scoring_elements 0.70298
published_at 2026-04-09T12:55:00Z
9
value 0.00631
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1854882
reference_id 1854882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1854882
5
reference_url https://security.archlinux.org/ASA-202007-2
reference_id ASA-202007-2
reference_type
scores
url https://security.archlinux.org/ASA-202007-2
6
reference_url https://security.archlinux.org/AVG-1198
reference_id AVG-1198
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1198
7
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
8
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:ebuild/net-analyzer/wireshark@3.2.5
purl pkg:ebuild/net-analyzer/wireshark@3.2.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5
aliases CVE-2020-15466
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx6e-pvpm-2fh7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5