Lookup for vulnerable packages by Package URL.

GET /api/packages/75387?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
    "type": "ebuild",
    "namespace": "net-analyzer",
    "name": "wireshark",
    "version": "3.2.5",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.2.6",
    "latest_non_vulnerable_version": "4.0.11",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39234?format=api",
            "vulnerability_id": "VCID-4vfa-7p4k-43cd",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82838",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82854",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82867",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82888",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82896",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82906",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82903",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13164"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839874",
                    "reference_id": "1839874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839874"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6262-1/",
                    "reference_id": "USN-6262-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6262-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-13164"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vfa-7p4k-43cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39237?format=api",
            "vulnerability_id": "VCID-czva-ymjk-8qfn",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69016",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69032",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69053",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69033",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69083",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69103",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69126",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6911",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69081",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9429"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828780",
                    "reference_id": "1828780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828780"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-9429"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-czva-ymjk-8qfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39239?format=api",
            "vulnerability_id": "VCID-gpjx-7syp-2yc7",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87724",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87748",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87751",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87772",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87778",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87783",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87782",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9430"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814615",
                    "reference_id": "1814615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814615"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-9430"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjx-7syp-2yc7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39241?format=api",
            "vulnerability_id": "VCID-ua7j-jegt-w7au",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88947",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88955",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88971",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88974",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88992",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88997",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89009",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89003",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9431"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814586",
                    "reference_id": "1814586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814586"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-9431"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua7j-jegt-w7au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39236?format=api",
            "vulnerability_id": "VCID-w8ha-2d3q-q3dz",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9428",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92163",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9217",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92176",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92191",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92194",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92196",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9428"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814622",
                    "reference_id": "1814622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814622"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-9428"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ha-2d3q-q3dz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39233?format=api",
            "vulnerability_id": "VCID-yx64-zwpx-pkg7",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82063",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82128",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82119",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82126",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82145",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82136",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82096",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82092",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11647"
                },
                {
                    "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474"
                },
                {
                    "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html"
                },
                {
                    "reference_url": "https://www.wireshark.org/security/wnpa-sec-2020-07.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.wireshark.org/security/wnpa-sec-2020-07.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824157",
                    "reference_id": "1824157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1824157"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213",
                    "reference_id": "958213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202004-10",
                    "reference_id": "ASA-202004-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202004-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1129",
                    "reference_id": "AVG-1129",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1129"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11647",
                    "reference_id": "CVE-2020-11647",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11647"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-11647"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx64-zwpx-pkg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39235?format=api",
            "vulnerability_id": "VCID-yx6e-pvpm-2fh7",
            "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70231",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70293",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70321",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70243",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7026",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70237",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70283",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70298",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854882",
                    "reference_id": "1854882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854882"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202007-2",
                    "reference_id": "ASA-202007-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202007-2"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1198",
                    "reference_id": "AVG-1198",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1198"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-13",
                    "reference_id": "GLSA-202007-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-13"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6262-1/",
                    "reference_id": "USN-6262-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6262-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/75387?format=api",
                    "purl": "pkg:ebuild/net-analyzer/wireshark@3.2.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
                }
            ],
            "aliases": [
                "CVE-2020-15466"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx6e-pvpm-2fh7"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@3.2.5"
}