Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942734?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "0.99.2-1", "latest_non_vulnerable_version": "4.6.4-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/230841?format=api", "vulnerability_id": "VCID-168w-peu7-63by", "summary": "ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21043", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21434", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21443", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21404", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9780" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20026", "reference_id": "20026", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:39:03Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20026" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-12.html", "reference_id": "wnpa-sec-2024-12.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:39:03Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-12.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942863?format=api", "purl": "pkg:deb/debian/wireshark@4.4.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-9780" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-168w-peu7-63by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72690?format=api", "vulnerability_id": "VCID-1wsk-9x9e-euh8", "summary": "wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11595.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01948", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.01963", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11595" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20176", "reference_id": "20176", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-22T15:14:41Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20176" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327764", "reference_id": "2327764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327764" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-14.html", "reference_id": "wnpa-sec-2024-14.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-22T15:14:41Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-14.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942857?format=api", "purl": "pkg:deb/debian/wireshark@4.4.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-11595" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wsk-9x9e-euh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82748?format=api", "vulnerability_id": "VCID-2dry-u12n-zqcs", "summary": "wireshark: IEEE 802.11 dissector infinite loop (wnpa-sec-2019-11 )", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10897.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10897.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69763", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.6983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69815", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10897" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15553" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=00d5e9e9fb377f52ab7696f25c1dbc011ef0244d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=00d5e9e9fb377f52ab7696f25c1dbc011ef0244d" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2019-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2019-11.html" }, { "reference_url": "http://www.securityfocus.com/bid/107836", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697961", "reference_id": "1697961", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697961" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10897", "reference_id": "CVE-2019-10897", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10897" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10897" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dry-u12n-zqcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82718?format=api", "vulnerability_id": "VCID-4ysu-r5z1-vqfa", "summary": "wireshark: TSDNS dissector crash (wnpa-sec-2019-16)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10902.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10902.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10902", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69763", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69815", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.6983", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10902" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15619" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=95571f17d5e2de39735e62e5251583f930c06d51", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=95571f17d5e2de39735e62e5251583f930c06d51" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2019-16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2019-16.html" }, { "reference_url": "http://www.securityfocus.com/bid/107836", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697942", "reference_id": "1697942", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697942" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10902", "reference_id": "CVE-2019-10902", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10902" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10902" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ysu-r5z1-vqfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78705?format=api", "vulnerability_id": "VCID-54sw-fegj-1bdf", "summary": "wireshark: EAP dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.2917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29094", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.2905", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0414" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18622", "reference_id": "18622", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:42Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18622" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165843", "reference_id": "2165843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165843" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0414.json", "reference_id": "CVE-2023-0414.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:42Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0414.json" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-01.html", "reference_id": "wnpa-sec-2023-01.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:42Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942848?format=api", "purl": "pkg:deb/debian/wireshark@4.0.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-0414" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-54sw-fegj-1bdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61605?format=api", "vulnerability_id": "VCID-5n7w-8c8x-v3h5", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2521.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2521.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09126", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09069", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09127", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09158", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2521" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-01.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-01.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312776", "reference_id": "1312776", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312776" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2521", "reference_id": "CVE-2016-2521", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2521" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2521" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7w-8c8x-v3h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56496?format=api", "vulnerability_id": "VCID-7hqt-9r62-h3g6", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3243.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3243.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3243", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.882", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03851", "scoring_system": "epss", "scoring_elements": "0.88172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04737", "scoring_system": "epss", "scoring_elements": "0.89367", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3243" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33223.txt", "reference_id": "CVE-2009-3243;OSVDB-58237", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33223.txt" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3243" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hqt-9r62-h3g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77874?format=api", "vulnerability_id": "VCID-8nv6-smk9-x3dt", "summary": "wireshark: HTTP3 dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1956", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19639", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19692", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19785", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19837", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19502", "reference_id": "19502", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-08T20:42:54Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19502" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256661", "reference_id": "2256661", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256661" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-03.html", "reference_id": "wnpa-sec-2024-03.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-08T20:42:54Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942856?format=api", "purl": "pkg:deb/debian/wireshark@4.2.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-0207" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8nv6-smk9-x3dt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83475?format=api", "vulnerability_id": "VCID-8wad-hesk-n3fy", "summary": "wireshark: Heap-based Buffer Overflow in packet-rtcp.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11355.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11355.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11355", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68897", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68914", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68935", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11355" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-27.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-27.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581758", "reference_id": "1581758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581758" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11355", "reference_id": "CVE-2018-11355", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11355" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-11355" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wad-hesk-n3fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64426?format=api", "vulnerability_id": "VCID-9jam-asdr-cyec", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14676", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14537", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20972", "reference_id": "20972", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20972" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641", "reference_id": "2442641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html", "reference_id": "wnpa-sec-2026-05.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-3201" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36697?format=api", "vulnerability_id": "VCID-a9t9-46ay-4kf7", "summary": "Multiple vulnerabilities in Wireshark allow for the remote\n execution of arbitrary code, or a Denial of Service condition.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc?revision=34115&view=revision", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?revision=34115&view=revision" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/18/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/18/2" }, { "reference_url": "http://openwall.com/lists/oss-security/2011/04/18/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2011/04/18/8" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80169", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80195", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01362", "scoring_system": "epss", "scoring_elements": "0.80181", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1592" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209" }, { "reference_url": "http://secunia.com/advisories/44172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/44172" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66833" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14987" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:083" }, { "reference_url": "http://www.osvdb.org/71847", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/71847" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/1022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/1022" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2011-06.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2011-06.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1592", "reference_id": "CVE-2011-1592", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1592" }, { "reference_url": "https://security.gentoo.org/glsa/201110-02", "reference_id": "GLSA-201110-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1592" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9t9-46ay-4kf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77706?format=api", "vulnerability_id": "VCID-ayjw-h4fs-mfhj", "summary": "wireshark: Buffer Overflow via pan/addr_resolv.c and ws_manuf_lookup_str() results in Denial of Service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24476.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24476.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85991", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.8594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85973", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85998", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02747", "scoring_system": "epss", "scoring_elements": "0.85996", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24476" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78", "reference_id": "108217f4bb1afb8b25fc705c2722b3e328b1ad78", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:59:46Z/" } ], "url": "https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19344", "reference_id": "19344", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:59:46Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19344" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265435", "reference_id": "2265435", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265435" }, { "reference_url": "https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b", "reference_id": "369ba0ccffe255cf8142208b6142be2b", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:59:46Z/" } ], "url": "https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/", "reference_id": "ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T17:59:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-24476" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ayjw-h4fs-mfhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83496?format=api", "vulnerability_id": "VCID-b61v-6d1r-1kam", "summary": "wireshark: Out-of-bounds Read in packet-ieee1905.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11354.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11354.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11354", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68141", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68204", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68211", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68252", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68238", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68181", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68159", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11354" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2018-26.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2018-26.html" }, { "reference_url": "http://www.securityfocus.com/bid/104308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104308" }, { "reference_url": "http://www.securitytracker.com/id/1041036", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581752", "reference_id": "1581752", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581752" }, { "reference_url": "https://security.archlinux.org/ASA-201805-23", "reference_id": "ASA-201805-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-23" }, { "reference_url": "https://security.archlinux.org/ASA-201805-25", "reference_id": "ASA-201805-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-25" }, { "reference_url": "https://security.archlinux.org/AVG-708", "reference_id": "AVG-708", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-708" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11354", "reference_id": "CVE-2018-11354", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11354" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-11354" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b61v-6d1r-1kam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61351?format=api", "vulnerability_id": "VCID-b6gd-r8sf-qbdu", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3725.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3725.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3725", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22665", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2274", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22813", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22775", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3725" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18378", "reference_id": "18378", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T19:13:59Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18378" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138742", "reference_id": "2138742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138742" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json", "reference_id": "CVE-2022-3725.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T19:13:59Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T19:13:59Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF/", "reference_id": "OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T19:13:59Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html", "reference_id": "wnpa-sec-2022-07.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T19:13:59Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942846?format=api", "purl": "pkg:deb/debian/wireshark@4.0.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-3725" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6gd-r8sf-qbdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32096?format=api", "vulnerability_id": "VCID-bmt8-up7w-9bag", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4183.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.4016", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40186", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40128", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4183" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039027", "reference_id": "2039027", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039027" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942843?format=api", "purl": "pkg:deb/debian/wireshark@3.6.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-4183" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bmt8-up7w-9bag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48994?format=api", "vulnerability_id": "VCID-csx6-t51m-zuhm", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/reassemble.c?r1=48943&r2=48942&pathrev=48943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/reassemble.c?r1=48943&r2=48942&pathrev=48943" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48943" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3556.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81356", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81303", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81325", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81379", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01538", "scoring_system": "epss", "scoring_elements": "0.81364", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3556" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599" }, { "reference_url": "http://secunia.com/advisories/53425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53425" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-25.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-25.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=966054", "reference_id": "966054", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=966054" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3556", "reference_id": "CVE-2013-3556", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3556" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-3556" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csx6-t51m-zuhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47192?format=api", "vulnerability_id": "VCID-ea45-fcyg-4ueb", "summary": "Multiple Denial of Service vulnerabilities have been discovered in\n Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1562.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97734", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.9774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97744", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97755", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97757", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.48752", "scoring_system": "epss", "scoring_elements": "0.97758", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440015", "reference_id": "440015", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440015" }, { "reference_url": "https://www.securityfocus.com/bid/28485/info", "reference_id": "CVE-2008-1561;OSVDB-43838", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/28485/info" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/31553.txt", "reference_id": "CVE-2008-1562;OSVDB-43840", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/31553.txt" }, { "reference_url": "https://security.gentoo.org/glsa/200805-05", "reference_id": "GLSA-200805-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200805-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0890", "reference_id": "RHSA-2008:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0890" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-1562" ], "risk_score": 0.8, "exploitability": "2.0", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ea45-fcyg-4ueb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65001?format=api", "vulnerability_id": "VCID-eakt-jj4w-kfck", "summary": "Wireshark: Wireshark: Denial of Service vulnerability in BLF file parser", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0961.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0961.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06329", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0643", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06421", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06415", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06362", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0961" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20880", "reference_id": "20880", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:08:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20880" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429763", "reference_id": "2429763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-01.html", "reference_id": "wnpa-sec-2026-01.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:08:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942865?format=api", "purl": "pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942871?format=api", "purl": "pkg:deb/debian/wireshark@4.6.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-0961" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eakt-jj4w-kfck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90564?format=api", "vulnerability_id": "VCID-evxr-c6tx-byg1", "summary": "Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1267.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1267.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77297", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77306", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77309", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1267" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-1267" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evxr-c6tx-byg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77704?format=api", "vulnerability_id": "VCID-gedk-acar-m3g5", "summary": "wireshark: integer overflow in dissect_bgp_open() in epan/dissectors/packet-bgp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51192", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24478" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19347", "reference_id": "19347", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19347" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265431", "reference_id": "2265431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265431" }, { "reference_url": "https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef", "reference_id": "80a4dc55f4d2fa33c2b36a99406500726d3faaef", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/" } ], "url": "https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef" }, { "reference_url": "https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694", "reference_id": "e82c55147cd3cb62ef20cbdb0ec83694", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/" } ], "url": "https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-24478" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gedk-acar-m3g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/162691?format=api", "vulnerability_id": "VCID-gmr6-xckd-aqfc", "summary": "The CORBA IDL dissectors in Wireshark 2.x before 2.0.5 on 64-bit Windows platforms do not properly interact with Visual C++ compiler options, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6503", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84288", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84219", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84232", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.8425", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84273", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84279", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02162", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6503" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/dos/40196.txt", "reference_id": "CVE-2016-6503", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/dos/40196.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-6503" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr6-xckd-aqfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82732?format=api", "vulnerability_id": "VCID-gyrm-y2uc-myay", "summary": "wireshark: GSUP dissector infinite loop (wnpa-sec-2019-18)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69763", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69815", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.6983", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10898" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15585" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f80b7d1b279fb6c13f640019a1bbc42b18bf7469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f80b7d1b279fb6c13f640019a1bbc42b18bf7469" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2019-12.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2019-12.html" }, { "reference_url": "http://www.securityfocus.com/bid/107836", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697955", "reference_id": "1697955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697955" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10898", "reference_id": "CVE-2019-10898", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10898" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10898" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyrm-y2uc-myay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37366?format=api", "vulnerability_id": "VCID-j5fv-hrep-fbe4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53771", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53872", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53841", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26422" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909799", "reference_id": "1909799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909799" }, { "reference_url": "https://security.archlinux.org/AVG-1377", "reference_id": "AVG-1377", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1377" }, { "reference_url": "https://security.gentoo.org/glsa/202101-12", "reference_id": "GLSA-202101-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-26422" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5fv-hrep-fbe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64425?format=api", "vulnerability_id": "VCID-jb8k-aqfy-2fej", "summary": "wireshark: NULL Pointer Dereference in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3202.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3202.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3202", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06677", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06775", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06721", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06705", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06782", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3202" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/21000", "reference_id": "21000", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:34:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/21000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442640", "reference_id": "2442640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442640" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-06.html", "reference_id": "wnpa-sec-2026-06.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:34:52Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-3202" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jb8k-aqfy-2fej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36673?format=api", "vulnerability_id": "VCID-jeep-85mh-hygt", "summary": "Multiple vulnerabilities in Wireshark allow for the remote\n execution of arbitrary code, or a Denial of Service condition.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63274", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63258", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3133" }, { "reference_url": "http://secunia.com/advisories/41064", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41064" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11498" }, { "reference_url": "http://www.exploit-db.com/exploits/14721/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/14721/" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2165", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2165" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2243", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2243" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2010-09.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2010-09.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2010-10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2010-10.html" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3133", "reference_id": "CVE-2010-3133", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3133" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14721.c", "reference_id": "CVE-2010-3133;OSVDB-67504", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14721.c" }, { "reference_url": "https://security.gentoo.org/glsa/201110-02", "reference_id": "GLSA-201110-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-3133" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jeep-85mh-hygt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83363?format=api", "vulnerability_id": "VCID-jfh8-3deb-fbav", "summary": "wireshark: Improper Access Control in create_app_running_mutex function in wsutil/file_util.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14438.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31331", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31336", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31375", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00122", "scoring_system": "epss", "scoring_elements": "0.31384", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14438" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14921" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/104876", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104876" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609948", "reference_id": "1609948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609948" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14438", "reference_id": "CVE-2018-14438", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14438" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-14438" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfh8-3deb-fbav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83684?format=api", "vulnerability_id": "VCID-jt67-4daz-bfbb", "summary": "wireshark: free operation on an uninitialized memory address in wiretap/netmon.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6836.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54765", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54804", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54963", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543582", "reference_id": "1543582", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543582" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-6836" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jt67-4daz-bfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48999?format=api", "vulnerability_id": "VCID-k953-hk1g-z3hy", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-etch.c?r1=48919&r2=48918&pathrev=48919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-etch.c?r1=48919&r2=48918&pathrev=48919" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mysql.c?r1=48894&r2=48893&pathrev=48894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mysql.c?r1=48894&r2=48893&pathrev=48894" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-websocket.c?r1=48336&r2=48335&pathrev=48336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-websocket.c?r1=48336&r2=48335&pathrev=48336" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48336" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48894" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48919" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3561.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3561.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81261", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81262", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81269", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3561" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8448" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8458" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464" }, { "reference_url": "http://secunia.com/advisories/53425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53425" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16755" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-29.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-29.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-30.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-30.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-31.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-31.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=966331", "reference_id": "966331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=966331" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3561", "reference_id": "CVE-2013-3561", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3561" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-3561" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k953-hk1g-z3hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71809?format=api", "vulnerability_id": "VCID-kdgd-xdqb-9khz", "summary": "wireshark: Uncontrolled Recursion in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16167", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20373", "reference_id": "20373", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20373" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737", "reference_id": "2346737", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9121", "reference_id": "RHSA-2025:9121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9121" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html", "reference_id": "wnpa-sec-2025-01.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942868?format=api", "purl": "pkg:deb/debian/wireshark@4.4.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-1492" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65004?format=api", "vulnerability_id": "VCID-kmey-h59s-h7fq", "summary": "Wireshark: Wireshark: Denial of service via IEEE 802.11 protocol dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0959.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06908", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06853", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0959" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20939", "reference_id": "20939", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:18:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20939" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429766", "reference_id": "2429766", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429766" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-02.html", "reference_id": "wnpa-sec-2026-02.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:18:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942865?format=api", "purl": "pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942871?format=api", "purl": "pkg:deb/debian/wireshark@4.6.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-0959" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmey-h59s-h7fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78833?format=api", "vulnerability_id": "VCID-krpe-ybjh-w7hj", "summary": "wireshark: denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3724.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59216", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00376", "scoring_system": "epss", "scoring_elements": "0.59232", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3724" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18384", "reference_id": "18384", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T19:27:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152791", "reference_id": "2152791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152791" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3724.json", "reference_id": "CVE-2022-3724.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T19:27:21Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3724.json" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-08.html", "reference_id": "wnpa-sec-2022-08.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T19:27:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-3724" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krpe-ybjh-w7hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68195?format=api", "vulnerability_id": "VCID-mnuz-t2nj-nfh5", "summary": "Wireshark: NULL Pointer Dereference in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10266", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20642", "reference_id": "20642", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839", "reference_id": "2392839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1714", "reference_id": "RHSA-2026:1714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2763", "reference_id": "RHSA-2026:2763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html", "reference_id": "wnpa-sec-2025-03.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942870?format=api", "purl": "pkg:deb/debian/wireshark@4.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942865?format=api", "purl": "pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-9817" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61362?format=api", "vulnerability_id": "VCID-p6ug-ju16-tffm", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16551", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16497", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2857" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19063", "reference_id": "19063", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:41:40Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19063" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210826", "reference_id": "2210826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210826" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json", "reference_id": "CVE-2023-2857.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:41:40Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:41:40Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:41:40Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-13.html", "reference_id": "wnpa-sec-2023-13.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:41:40Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-13.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942849?format=api", "purl": "pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942850?format=api", "purl": "pkg:deb/debian/wireshark@4.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-2857" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p6ug-ju16-tffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77871?format=api", "vulnerability_id": "VCID-pcm4-urcs-xqdk", "summary": "wireshark: Zigbee TLV dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0210.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0210.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0210", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22326", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22404", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22434", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22479", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0210" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19504", "reference_id": "19504", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:51:24Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19504" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256654", "reference_id": "2256654", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256654" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-04.html", "reference_id": "wnpa-sec-2024-04.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:51:24Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942856?format=api", "purl": "pkg:deb/debian/wireshark@4.2.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-0210" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcm4-urcs-xqdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61359?format=api", "vulnerability_id": "VCID-r943-b2cb-2ucb", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2854.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2854.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2854", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16551", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16413", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16498", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16497", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2854" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19084", "reference_id": "19084", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:58Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19084" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210820", "reference_id": "2210820", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210820" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json", "reference_id": "CVE-2023-2854.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:58Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:58Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:58Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-17.html", "reference_id": "wnpa-sec-2023-17.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:58Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-17.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942849?format=api", "purl": "pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942850?format=api", "purl": "pkg:deb/debian/wireshark@4.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-2854" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r943-b2cb-2ucb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66429?format=api", "vulnerability_id": "VCID-rryp-4b2m-tbfz", "summary": "Wireshark: Wireshark: BPv7 dissector crash leads to denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13674.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05959", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06052", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.06033", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.0599", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13674" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20770", "reference_id": "20770", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:06:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20770" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417250", "reference_id": "2417250", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417250" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-05.html", "reference_id": "wnpa-sec-2025-05.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:06:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942866?format=api", "purl": "pkg:deb/debian/wireshark@4.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-13674" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rryp-4b2m-tbfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82722?format=api", "vulnerability_id": "VCID-tth5-j9hy-bkey", "summary": "wireshark: Rbm dissector infinite loop (wnpa-sec-2019-13)", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69763", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69775", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.69815", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00613", "scoring_system": "epss", "scoring_elements": "0.6983", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10900" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15612" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=26eee01f57f0a86fb375892c7937eac24ede4610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=26eee01f57f0a86fb375892c7937eac24ede4610" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4LYIOOQIMFQ3PA7AFBK4DNXHISTEYUC5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU3QA2DUO3XS24QE24CQRP4A4XQQY76R/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2019-13.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2019-13.html" }, { "reference_url": "http://www.securityfocus.com/bid/107836", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697952", "reference_id": "1697952", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697952" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10900", "reference_id": "CVE-2019-10900", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10900" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10900" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tth5-j9hy-bkey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42206?format=api", "vulnerability_id": "VCID-u2u7-9ghe-4ufc", "summary": "Multiple vulnerabilities were found in Wireshark.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67586", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67623", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67688", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67712", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00541", "scoring_system": "epss", "scoring_elements": "0.67663", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4378" }, { "reference_url": "https://security.gentoo.org/glsa/201006-05", "reference_id": "GLSA-201006-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-4378" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u2u7-9ghe-4ufc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77705?format=api", "vulnerability_id": "VCID-v2b1-vz5w-tfag", "summary": "wireshark: Buffer Overflow via wsutil/to_str.c and format_fractional_part_nsecs results in Denial of Service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.6224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.6227", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62303", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62322", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00427", "scoring_system": "epss", "scoring_elements": "0.62312", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-24479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265433", "reference_id": "2265433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265433" }, { "reference_url": "https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd", "reference_id": "c3720cff158c265dec2a0c6104b1d65954ae6bfd", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:09:16Z/" } ], "url": "https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd" }, { "reference_url": "https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78", "reference_id": "c50ad17e9a1a18990043a7cd27814c78", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:09:16Z/" } ], "url": "https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/", "reference_id": "ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:09:16Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-24479" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v2b1-vz5w-tfag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36680?format=api", "vulnerability_id": "VCID-vnf1-47ty-jqd5", "summary": "Multiple vulnerabilities in Wireshark allow for the remote\n execution of arbitrary code, or a Denial of Service condition.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053650.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053650.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053669.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053669.html" }, { "reference_url": "http://osvdb.org/70402", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70402" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0445.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0445.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0445", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71932", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71915", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71926", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.7195", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0445" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5537" }, { "reference_url": "http://secunia.com/advisories/43175", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43175" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64625" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14505" }, { "reference_url": "http://www.securityfocus.com/bid/45775", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45775" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0079" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0270", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0270" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2011-02.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2011-02.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=669443", "reference_id": "669443", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=669443" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0445", "reference_id": "CVE-2011-0445", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0445" }, { "reference_url": "https://security.gentoo.org/glsa/201110-02", "reference_id": "GLSA-201110-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-0445" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vnf1-47ty-jqd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48875?format=api", "vulnerability_id": "VCID-wttd-e78a-cua8", "summary": "Wireshark is vulnerable to several security issues that may lead to a\n Denial of Service and/or the execution of arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86844", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86866", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.86875", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03132", "scoring_system": "epss", "scoring_elements": "0.8687", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4332" }, { "reference_url": "https://security.gentoo.org/glsa/200608-26", "reference_id": "GLSA-200608-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4332" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wttd-e78a-cua8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65002?format=api", "vulnerability_id": "VCID-x7ve-8s25-byg6", "summary": "Wireshark: Wireshark: Denial of Service via SOME/IP-SD protocol dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0962.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0962.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0962", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09191", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09222", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0962" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20945", "reference_id": "20945", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:11:03Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20945" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429764", "reference_id": "2429764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429764" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-03.html", "reference_id": "wnpa-sec-2026-03.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:11:03Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942865?format=api", "purl": "pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942871?format=api", "purl": "pkg:deb/debian/wireshark@4.6.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-0962" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x7ve-8s25-byg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36676?format=api", "vulnerability_id": "VCID-y2k4-j1e9-x7cg", "summary": "Multiple vulnerabilities in Wireshark allow for the remote\n execution of arbitrary code, or a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "reference_url": "http://osvdb.org/69355", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/69355" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4301.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90411", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4301" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5315&action=edit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5315&action=edit" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5303" }, { "reference_url": "http://secunia.com/advisories/42290", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42290" }, { "reference_url": "http://secunia.com/advisories/42877", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42877" }, { "reference_url": "http://secunia.com/advisories/43068", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43068" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14713" }, { "reference_url": "http://www.exploit-db.com/exploits/15973", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/15973" }, { "reference_url": "http://www.securityfocus.com/bid/44986", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44986" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3038" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0076", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0076" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0212", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2010-14.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2010-14.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=656437", "reference_id": "656437", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656437" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/15973.txt", "reference_id": "CVE-2010-4301", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/15973.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4301", "reference_id": "CVE-2010-4301", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4301" }, { "reference_url": "https://security.gentoo.org/glsa/201110-02", "reference_id": "GLSA-201110-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-4301" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2k4-j1e9-x7cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50005?format=api", "vulnerability_id": "VCID-ymb3-akvw-5fen", "summary": "Multiple out-of-bounds read vulnerabilities have been discovered in Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5371.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5371.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5371", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15771", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15576", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15719", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15587", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5371" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250146", "reference_id": "2250146", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250146" }, { "reference_url": "https://security.gentoo.org/glsa/202402-09", "reference_id": "GLSA-202402-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-09" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942854?format=api", "purl": "pkg:deb/debian/wireshark@4.0.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942851?format=api", "purl": "pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-5371" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ymb3-akvw-5fen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50006?format=api", "vulnerability_id": "VCID-zv7p-64f3-9kdy", "summary": "Multiple out-of-bounds read vulnerabilities have been discovered in Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3268", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32668", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32743", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32707", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32846", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19369", "reference_id": "19369", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T14:08:56Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19369" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250148", "reference_id": "2250148", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250148" }, { "reference_url": "https://security.gentoo.org/glsa/202402-09", "reference_id": "GLSA-202402-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-09" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-28.html", "reference_id": "wnpa-sec-2023-28.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-11T14:08:56Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-28.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942851?format=api", "purl": "pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942855?format=api", "purl": "pkg:deb/debian/wireshark@4.0.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-6174" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zv7p-64f3-9kdy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }