| 0 |
| url |
VCID-168w-peu7-63by |
| vulnerability_id |
VCID-168w-peu7-63by |
| summary |
ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21349 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21295 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21434 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21443 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21404 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9780 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-9780
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-168w-peu7-63by |
|
| 1 |
| url |
VCID-1wsk-9x9e-euh8 |
| vulnerability_id |
VCID-1wsk-9x9e-euh8 |
| summary |
wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11595 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01787 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01943 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01963 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11595 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-11595
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1wsk-9x9e-euh8 |
|
| 2 |
| url |
VCID-2dry-u12n-zqcs |
| vulnerability_id |
VCID-2dry-u12n-zqcs |
| summary |
wireshark: IEEE 802.11 dissector infinite loop (wnpa-sec-2019-11 ) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69763 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69775 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10897 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10897
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2dry-u12n-zqcs |
|
| 3 |
| url |
VCID-4ysu-r5z1-vqfa |
| vulnerability_id |
VCID-4ysu-r5z1-vqfa |
| summary |
wireshark: TSDNS dissector crash (wnpa-sec-2019-16) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10902 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69763 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69775 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10902 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10902
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ysu-r5z1-vqfa |
|
| 4 |
| url |
VCID-54sw-fegj-1bdf |
| vulnerability_id |
VCID-54sw-fegj-1bdf |
| summary |
wireshark: EAP dissector crash |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0414 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29119 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28999 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2917 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.28981 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29045 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29088 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29094 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.2905 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0414 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0414
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-54sw-fegj-1bdf |
|
| 5 |
| url |
VCID-5n7w-8c8x-v3h5 |
| vulnerability_id |
VCID-5n7w-8c8x-v3h5 |
| summary |
Multiple vulnerabilities have been found in Wireshark, allowing
local attackers to escalate privileges and remote attackers to cause Denial
of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2521 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09159 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09126 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09069 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09075 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09127 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09047 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09158 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2521 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2521
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7w-8c8x-v3h5 |
|
| 6 |
| url |
VCID-7hqt-9r62-h3g6 |
| vulnerability_id |
VCID-7hqt-9r62-h3g6 |
| summary |
Multiple vulnerabilities have been discovered in Wireshark, allowing for
the remote execution of arbitrary code, or Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3243 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03851 |
| scoring_system |
epss |
| scoring_elements |
0.882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.03851 |
| scoring_system |
epss |
| scoring_elements |
0.88191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.03851 |
| scoring_system |
epss |
| scoring_elements |
0.88197 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.03851 |
| scoring_system |
epss |
| scoring_elements |
0.88207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.03851 |
| scoring_system |
epss |
| scoring_elements |
0.88172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04737 |
| scoring_system |
epss |
| scoring_elements |
0.89372 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.04737 |
| scoring_system |
epss |
| scoring_elements |
0.89383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.04737 |
| scoring_system |
epss |
| scoring_elements |
0.89367 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3243 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-3243
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7hqt-9r62-h3g6 |
|
| 7 |
| url |
VCID-8nv6-smk9-x3dt |
| vulnerability_id |
VCID-8nv6-smk9-x3dt |
| summary |
wireshark: HTTP3 dissector crash via packet injection or crafted capture file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0207 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19589 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19639 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19692 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19696 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19837 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0207 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0207
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8nv6-smk9-x3dt |
|
| 8 |
| url |
VCID-8wad-hesk-n3fy |
| vulnerability_id |
VCID-8wad-hesk-n3fy |
| summary |
wireshark: Heap-based Buffer Overflow in packet-rtcp.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11355 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68897 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69006 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68992 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68914 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68935 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11355 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11355
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8wad-hesk-n3fy |
|
| 9 |
| url |
VCID-9jam-asdr-cyec |
| vulnerability_id |
VCID-9jam-asdr-cyec |
| summary |
wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10281 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10178 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14636 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14619 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14676 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14598 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14537 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3201 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3201
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec |
|
| 10 |
| url |
VCID-a9t9-46ay-4kf7 |
| vulnerability_id |
VCID-a9t9-46ay-4kf7 |
| summary |
Multiple vulnerabilities in Wireshark allow for the remote
execution of arbitrary code, or a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1592 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80172 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80125 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80132 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80169 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80177 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80195 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80181 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1592 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1592
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a9t9-46ay-4kf7 |
|
| 11 |
| url |
VCID-ayjw-h4fs-mfhj |
| vulnerability_id |
VCID-ayjw-h4fs-mfhj |
| summary |
wireshark: Buffer Overflow via pan/addr_resolv.c and ws_manuf_lookup_str() results in Denial of Service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.8594 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85956 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85955 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85973 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85998 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02747 |
| scoring_system |
epss |
| scoring_elements |
0.85996 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-24476
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ayjw-h4fs-mfhj |
|
| 12 |
| url |
VCID-b61v-6d1r-1kam |
| vulnerability_id |
VCID-b61v-6d1r-1kam |
| summary |
wireshark: Out-of-bounds Read in packet-ieee1905.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11354 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68204 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68211 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68226 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68252 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68238 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68181 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00558 |
| scoring_system |
epss |
| scoring_elements |
0.68159 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11354 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11354
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b61v-6d1r-1kam |
|
| 13 |
| url |
VCID-b6gd-r8sf-qbdu |
| vulnerability_id |
VCID-b6gd-r8sf-qbdu |
| summary |
Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.2089 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20832 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22718 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2274 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22791 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22813 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22775 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3725 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3725
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b6gd-r8sf-qbdu |
|
| 14 |
| url |
VCID-bmt8-up7w-9bag |
| vulnerability_id |
VCID-bmt8-up7w-9bag |
| summary |
Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40012 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.4016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40186 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40109 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40175 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40147 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00184 |
| scoring_system |
epss |
| scoring_elements |
0.40128 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4183
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bmt8-up7w-9bag |
|
| 15 |
| url |
VCID-csx6-t51m-zuhm |
| vulnerability_id |
VCID-csx6-t51m-zuhm |
| summary |
Multiple vulnerabilities have been found in Wireshark, allowing
remote attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-3556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81356 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81294 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81324 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81353 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81358 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81379 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01538 |
| scoring_system |
epss |
| scoring_elements |
0.81364 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-3556 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-3556
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-csx6-t51m-zuhm |
|
| 16 |
| url |
VCID-ea45-fcyg-4ueb |
| vulnerability_id |
VCID-ea45-fcyg-4ueb |
| summary |
Multiple Denial of Service vulnerabilities have been discovered in
Wireshark. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1562 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97734 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.9774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97742 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97744 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97757 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.48752 |
| scoring_system |
epss |
| scoring_elements |
0.97758 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-1562 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-1562
|
| risk_score |
0.8 |
| exploitability |
2.0 |
| weighted_severity |
0.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ea45-fcyg-4ueb |
|
| 17 |
| url |
VCID-eakt-jj4w-kfck |
| vulnerability_id |
VCID-eakt-jj4w-kfck |
| summary |
Wireshark: Wireshark: Denial of Service vulnerability in BLF file parser |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0961 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06341 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0643 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06421 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06362 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0961 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0961
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eakt-jj4w-kfck |
|
| 18 |
| url |
VCID-evxr-c6tx-byg1 |
| vulnerability_id |
VCID-evxr-c6tx-byg1 |
| summary |
Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77249 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77284 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77266 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77297 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77306 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77333 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77313 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01029 |
| scoring_system |
epss |
| scoring_elements |
0.77309 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1267 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1267
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-evxr-c6tx-byg1 |
|
| 19 |
| url |
VCID-gedk-acar-m3g5 |
| vulnerability_id |
VCID-gedk-acar-m3g5 |
| summary |
wireshark: integer overflow in dissect_bgp_open() in epan/dissectors/packet-bgp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24478 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51177 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51161 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51119 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51174 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.5117 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51214 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51192 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24478 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-24478
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gedk-acar-m3g5 |
|
| 20 |
| url |
VCID-gmr6-xckd-aqfc |
| vulnerability_id |
VCID-gmr6-xckd-aqfc |
| summary |
The CORBA IDL dissectors in Wireshark 2.x before 2.0.5 on 64-bit Windows platforms do not properly interact with Visual C++ compiler options, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6503 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84232 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.8425 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84251 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84273 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84279 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02162 |
| scoring_system |
epss |
| scoring_elements |
0.84291 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-6503 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-6503
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr6-xckd-aqfc |
|
| 21 |
| url |
VCID-gyrm-y2uc-myay |
| vulnerability_id |
VCID-gyrm-y2uc-myay |
| summary |
wireshark: GSUP dissector infinite loop (wnpa-sec-2019-18) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69763 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69775 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10898 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10898
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gyrm-y2uc-myay |
|
| 22 |
| url |
VCID-j5fv-hrep-fbe4 |
| vulnerability_id |
VCID-j5fv-hrep-fbe4 |
| summary |
Multiple vulnerabilities have been found in Wireshark, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26422 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53771 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53856 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53889 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53872 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53791 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53817 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53841 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26422 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26422
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j5fv-hrep-fbe4 |
|
| 23 |
| url |
VCID-jb8k-aqfy-2fej |
| vulnerability_id |
VCID-jb8k-aqfy-2fej |
| summary |
wireshark: NULL Pointer Dereference in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06677 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06721 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06705 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06756 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06782 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3202 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3202
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jb8k-aqfy-2fej |
|
| 24 |
| url |
VCID-jeep-85mh-hygt |
| vulnerability_id |
VCID-jeep-85mh-hygt |
| summary |
Multiple vulnerabilities in Wireshark allow for the remote
execution of arbitrary code, or a Denial of Service condition. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63222 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63132 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63192 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63221 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63187 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63239 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63258 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3133 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-3133
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jeep-85mh-hygt |
|
| 25 |
| url |
VCID-jfh8-3deb-fbav |
| vulnerability_id |
VCID-jfh8-3deb-fbav |
| summary |
wireshark: Improper Access Control in create_app_running_mutex function in wsutil/file_util.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14438 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31331 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31336 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31414 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31471 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31513 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31384 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14438 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14438
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jfh8-3deb-fbav |
|
| 26 |
| url |
VCID-jt67-4daz-bfbb |
| vulnerability_id |
VCID-jt67-4daz-bfbb |
| summary |
wireshark: free operation on an uninitialized memory address in wiretap/netmon.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6836 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54695 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54787 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54757 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54807 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54804 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54799 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54963 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6836 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-6836
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jt67-4daz-bfbb |
|
| 27 |
| url |
VCID-k953-hk1g-z3hy |
| vulnerability_id |
VCID-k953-hk1g-z3hy |
| summary |
Multiple vulnerabilities have been found in Wireshark, allowing
remote attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-3561 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81261 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81257 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81269 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-3561 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-3561
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k953-hk1g-z3hy |
|
| 28 |
| url |
VCID-kdgd-xdqb-9khz |
| vulnerability_id |
VCID-kdgd-xdqb-9khz |
| summary |
wireshark: Uncontrolled Recursion in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-1492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15595 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15662 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16099 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16224 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16167 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-1492 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-1492
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz |
|
| 29 |
| url |
VCID-kmey-h59s-h7fq |
| vulnerability_id |
VCID-kmey-h59s-h7fq |
| summary |
Wireshark: Wireshark: Denial of service via IEEE 802.11 protocol dissector crash |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0959 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06805 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06908 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0684 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06853 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0959 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0959
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kmey-h59s-h7fq |
|
| 30 |
| url |
VCID-krpe-ybjh-w7hj |
| vulnerability_id |
VCID-krpe-ybjh-w7hj |
| summary |
wireshark: denial of service via packet injection or crafted capture file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3724 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59201 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59165 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59216 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59249 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59232 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3724 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3724
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-krpe-ybjh-w7hj |
|
| 31 |
| url |
VCID-mnuz-t2nj-nfh5 |
| vulnerability_id |
VCID-mnuz-t2nj-nfh5 |
| summary |
Wireshark: NULL Pointer Dereference in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10038 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1011 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10072 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10132 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10171 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10131 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10266 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9817 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9817
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5 |
|
| 32 |
| url |
VCID-p6ug-ju16-tffm |
| vulnerability_id |
VCID-p6ug-ju16-tffm |
| summary |
Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2857 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16551 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16438 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16614 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16413 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16498 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16497 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2857 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2857
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p6ug-ju16-tffm |
|
| 33 |
| url |
VCID-pcm4-urcs-xqdk |
| vulnerability_id |
VCID-pcm4-urcs-xqdk |
| summary |
wireshark: Zigbee TLV dissector crash via packet injection or crafted capture file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22326 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22266 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22349 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22425 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22383 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22434 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22479 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0210 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0210
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pcm4-urcs-xqdk |
|
| 34 |
| url |
VCID-r943-b2cb-2ucb |
| vulnerability_id |
VCID-r943-b2cb-2ucb |
| summary |
Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16551 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16438 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16614 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16413 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16498 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16497 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2854 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2854
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r943-b2cb-2ucb |
|
| 35 |
| url |
VCID-rryp-4b2m-tbfz |
| vulnerability_id |
VCID-rryp-4b2m-tbfz |
| summary |
Wireshark: Wireshark: BPv7 dissector crash leads to denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06025 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05976 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06052 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06042 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0599 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13674 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13674
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rryp-4b2m-tbfz |
|
| 36 |
| url |
VCID-tth5-j9hy-bkey |
| vulnerability_id |
VCID-tth5-j9hy-bkey |
| summary |
wireshark: Rbm dissector infinite loop (wnpa-sec-2019-13) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10900 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69763 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69775 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00613 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10900 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10900
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tth5-j9hy-bkey |
|
| 37 |
| url |
VCID-u2u7-9ghe-4ufc |
| vulnerability_id |
VCID-u2u7-9ghe-4ufc |
| summary |
Multiple vulnerabilities were found in Wireshark. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67586 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67622 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67643 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67674 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67688 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67712 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67663 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4378 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-4378
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u2u7-9ghe-4ufc |
|
| 38 |
| url |
VCID-v2b1-vz5w-tfag |
| vulnerability_id |
VCID-v2b1-vz5w-tfag |
| summary |
wireshark: Buffer Overflow via wsutil/to_str.c and format_fractional_part_nsecs results in Denial of Service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24479 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62291 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.6224 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.6227 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62236 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62286 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62303 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62312 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-24479 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-24479
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v2b1-vz5w-tfag |
|
| 39 |
| url |
VCID-vnf1-47ty-jqd5 |
| vulnerability_id |
VCID-vnf1-47ty-jqd5 |
| summary |
Multiple vulnerabilities in Wireshark allow for the remote
execution of arbitrary code, or a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0445 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71932 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71877 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71904 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71876 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71915 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.71926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00696 |
| scoring_system |
epss |
| scoring_elements |
0.7195 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0445 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0445
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vnf1-47ty-jqd5 |
|
| 40 |
| url |
VCID-wttd-e78a-cua8 |
| vulnerability_id |
VCID-wttd-e78a-cua8 |
| summary |
Wireshark is vulnerable to several security issues that may lead to a
Denial of Service and/or the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4332 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86815 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86825 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86844 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86838 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86858 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86866 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.86875 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03132 |
| scoring_system |
epss |
| scoring_elements |
0.8687 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-4332 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-4332
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wttd-e78a-cua8 |
|
| 41 |
| url |
VCID-x7ve-8s25-byg6 |
| vulnerability_id |
VCID-x7ve-8s25-byg6 |
| summary |
Wireshark: Wireshark: Denial of Service via SOME/IP-SD protocol dissector crash |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0962 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09135 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09177 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09187 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0911 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09191 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09221 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09222 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0962 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0962
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x7ve-8s25-byg6 |
|
| 42 |
| url |
VCID-y2k4-j1e9-x7cg |
| vulnerability_id |
VCID-y2k4-j1e9-x7cg |
| summary |
Multiple vulnerabilities in Wireshark allow for the remote
execution of arbitrary code, or a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4301 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90371 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90374 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90386 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.9039 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05697 |
| scoring_system |
epss |
| scoring_elements |
0.90411 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-4301 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-4301
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y2k4-j1e9-x7cg |
|
| 43 |
| url |
VCID-ymb3-akvw-5fen |
| vulnerability_id |
VCID-ymb3-akvw-5fen |
| summary |
Multiple out-of-bounds read vulnerabilities have been discovered in Wireshark. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5371 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15771 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15576 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15661 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15719 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15652 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15587 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5371 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5371
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymb3-akvw-5fen |
|
| 44 |
| url |
VCID-zv7p-64f3-9kdy |
| vulnerability_id |
VCID-zv7p-64f3-9kdy |
| summary |
Multiple out-of-bounds read vulnerabilities have been discovered in Wireshark. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6174 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32811 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32668 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32716 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32742 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32743 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32707 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32846 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-6174 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-6174
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zv7p-64f3-9kdy |
|