Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/wireshark@1.6.6-1?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | wireshark |
| Version | 1.6.6-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 1.6.8-1 |
| Latest_non_vulnerable_version | 4.6.4-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-3tpk-vxrh-7ffc |
| vulnerability_id |
VCID-3tpk-vxrh-7ffc |
| summary |
wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1595 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77444 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77451 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77476 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77495 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77521 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77498 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77537 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77534 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01047 |
| scoring_system |
epss |
| scoring_elements |
0.77527 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1595 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1595
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3tpk-vxrh-7ffc |
|
| 1 |
| url |
VCID-nrun-w4a4-9fbp |
| vulnerability_id |
VCID-nrun-w4a4-9fbp |
| summary |
wireshark: Infinite loop in the IEEE 802.11 dissector |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1594 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48651 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48692 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48717 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48671 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48725 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48722 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.4874 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48714 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48721 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.4877 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48765 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48724 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1594 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1594
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nrun-w4a4-9fbp |
|
| 2 |
| url |
VCID-rvns-hbwq-rfac |
| vulnerability_id |
VCID-rvns-hbwq-rfac |
| summary |
wireshark: MP2T dissector memory allocation flaw |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1596 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85511 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85523 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85589 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.8561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85607 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1596 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1596
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rvns-hbwq-rfac |
|
| 3 |
| url |
VCID-wfsm-sjbv-8yc3 |
| vulnerability_id |
VCID-wfsm-sjbv-8yc3 |
| summary |
wireshark: NULL pointer dereference in ANSI A dissector |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1593 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81094 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81127 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81154 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.8116 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81179 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81166 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81159 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81196 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01504 |
| scoring_system |
epss |
| scoring_elements |
0.81195 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1593 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1593
|
| risk_score |
null |
| exploitability |
2.0 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wfsm-sjbv-8yc3 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.6-1%3Fdistro=trixie |