Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/83075?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "type": "ebuild", "namespace": "net-analyzer", "name": "wireshark", "version": "1.2.3", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.2.8-r1", "latest_non_vulnerable_version": "4.0.11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56494?format=api", "vulnerability_id": "VCID-6ubh-6puz-bkcc", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3241.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.8949", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.8947", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89452", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89458", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04771", "scoring_system": "epss", "scoring_elements": "0.89473", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05851", "scoring_system": "epss", "scoring_elements": "0.90515", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05851", "scoring_system": "epss", "scoring_elements": "0.90526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05851", "scoring_system": "epss", "scoring_elements": "0.90511", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=523987", "reference_id": "523987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=523987" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547704", "reference_id": "547704", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547704" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33222.txt", "reference_id": "CVE-2009-3241;OSVDB-58157", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33222.txt" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3241" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ubh-6puz-bkcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56496?format=api", "vulnerability_id": "VCID-7hqt-9r62-h3g6", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3243.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3243.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3243", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88239", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88236", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3243" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33223.txt", "reference_id": "CVE-2009-3243;OSVDB-58237", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33223.txt" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3243" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hqt-9r62-h3g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56499?format=api", "vulnerability_id": "VCID-9y83-v5gv-puh3", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3551.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71995", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72019", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72028", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72036", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72064", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72071", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72065", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=531265", "reference_id": "531265", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531265" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3551" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9y83-v5gv-puh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56498?format=api", "vulnerability_id": "VCID-bshu-54kw-j7hn", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3550.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82501", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82527", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82537", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82541", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=531260", "reference_id": "531260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531260" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3550" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-54kw-j7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38443?format=api", "vulnerability_id": "VCID-k59u-tnkh-yqa1", "summary": "Multiple vulnerabilities have been discovered in Wireshark which allow for\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2560.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2560.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2560", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85791", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85814", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85855", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.8587", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85889", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85897", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85899", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=513008", "reference_id": "513008", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513008" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237", "reference_id": "538237", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237" }, { "reference_url": "https://security.gentoo.org/glsa/200909-16", "reference_id": "GLSA-200909-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200909-16" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/75295?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-2560" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k59u-tnkh-yqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56501?format=api", "vulnerability_id": "VCID-ubvy-r1n3-z7c8", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90267", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.9028", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90285", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.903", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90337", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=532479", "reference_id": "532479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532479" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3829" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubvy-r1n3-z7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56495?format=api", "vulnerability_id": "VCID-ukha-hqab-yfd3", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3242.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3242.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3242", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86948", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86921", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86943", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86896", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86909", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.86915", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03151", "scoring_system": "epss", "scoring_elements": "0.8692", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03885", "scoring_system": "epss", "scoring_elements": "0.88201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03885", "scoring_system": "epss", "scoring_elements": "0.88217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03885", "scoring_system": "epss", "scoring_elements": "0.88193", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3242" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=524001", "reference_id": "524001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524001" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547704", "reference_id": "547704", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547704" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33224.txt", "reference_id": "CVE-2009-3242;OSVDB-58238", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33224.txt" }, { "reference_url": "https://www.securityfocus.com/bid/36408/info", "reference_id": "CVE-2009-3243;OSVDB-58237", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/36408/info" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3242" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukha-hqab-yfd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56497?format=api", "vulnerability_id": "VCID-yqz3-h5e7-dba1", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3549.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.7966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79688", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79696", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79756", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79763", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01296", "scoring_system": "epss", "scoring_elements": "0.79778", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=531249", "reference_id": "531249", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531249" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83075?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.2.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" } ], "aliases": [ "CVE-2009-3549" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqz3-h5e7-dba1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.2.3" }