Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942772?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "1.6.8-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.8.2-1", "latest_non_vulnerable_version": "4.6.3-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87073?format=api", "vulnerability_id": "VCID-6f2f-2esc-mke6", "summary": "wireshark: Infinite and large loops in ANSI MAP, ASF, IEEE 802.11, IEEE 802.3, and LTP dissectors (wnpa-sec-2012-08)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2392.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2392.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2392", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84737", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84771", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84821", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84817", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84834", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84833", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84859", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.8487", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02324", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=824411", "reference_id": "824411", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824411" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18919.txt", "reference_id": "OSVDB-82160;OSVDB-82159;OSVDB-82158;OSVDB-82157;OSVDB-82156;OSVDB-82155;OSVDB-82154;OSVDB-82098;CVE-2012-3826;CVE-2012-3825;CVE-2012-2392", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18919.txt" }, { "reference_url": "https://www.securityfocus.com/bid/53651/info", "reference_id": "OSVDB-82160;OSVDB-82159;OSVDB-82158;OSVDB-82157;OSVDB-82156;OSVDB-82155;OSVDB-82154;OSVDB-82098;CVE-2012-3826;CVE-2012-3825;CVE-2012-2392", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/53651/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2392" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6f2f-2esc-mke6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87074?format=api", "vulnerability_id": "VCID-a693-byvx-fqak", "summary": "wireshark: Memory allocation flaw in the DIAMETER dissector (wnpa-sec-2012-09)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2393.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77702", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77718", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77728", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77758", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.7779", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77799", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0107", "scoring_system": "epss", "scoring_elements": "0.77814", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=824413", "reference_id": "824413", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824413" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18918.txt", "reference_id": "OSVDB-82099;CVE-2012-2393", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18918.txt" }, { "reference_url": "https://www.securityfocus.com/bid/53652/info", "reference_id": "OSVDB-82099;CVE-2012-2393", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/53652/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2393" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a693-byvx-fqak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87075?format=api", "vulnerability_id": "VCID-cwd2-qzmb-eqh3", "summary": "wireshark: Denial of service (crash) due memory alignment problem on SPARC and Itanium processors (wnpa-sec-2012-10)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2394.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2394.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2394", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81467", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81455", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81462", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.8136", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81393", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81415", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81432", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01546", "scoring_system": "epss", "scoring_elements": "0.81433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01824", "scoring_system": "epss", "scoring_elements": "0.82832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01824", "scoring_system": "epss", "scoring_elements": "0.82816", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2394" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=824419", "reference_id": "824419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824419" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18920.txt", "reference_id": "CVE-2012-2394;OSVDB-82100", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/18920.txt" }, { "reference_url": "https://www.securityfocus.com/bid/53653/info", "reference_id": "CVE-2012-2394;OSVDB-82100", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/53653/info" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2394" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwd2-qzmb-eqh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87106?format=api", "vulnerability_id": "VCID-g7sf-ca3z-3fep", "summary": "wireshark: Integer overflows in the R3 dissector, leading to DoS (wnpa-sec-2012-08)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75902", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75963", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75998", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75982", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.7602", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.7603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76041", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3826" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3826", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3826" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=836961", "reference_id": "836961", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836961" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3826" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g7sf-ca3z-3fep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87105?format=api", "vulnerability_id": "VCID-k414-ufya-1yhp", "summary": "wireshark: Integer overflows in BACapp and Bluetooth HCI dissectors, leading to DoS (wnpa-sec-2012-08)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83723", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83737", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8377", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83787", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8378", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.8381", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83811", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83836", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83844", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02024", "scoring_system": "epss", "scoring_elements": "0.83849", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=836960", "reference_id": "836960", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942772?format=api", "purl": "pkg:deb/debian/wireshark@1.6.8-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3825" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k414-ufya-1yhp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@1.6.8-1%3Fdistro=trixie" }