| 0 |
| url |
VCID-1her-1nh5-57cx |
| vulnerability_id |
VCID-1her-1nh5-57cx |
| summary |
wireshark: SIGCOMP dissector crash in packet-sigcomp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7418 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7418 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7418
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx |
|
| 1 |
| url |
VCID-1ndt-2ndw-mug2 |
| vulnerability_id |
VCID-1ndt-2ndw-mug2 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7323 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7323 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7323
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2 |
|
| 2 |
| url |
VCID-9g71-v5zu-tqg3 |
| vulnerability_id |
VCID-9g71-v5zu-tqg3 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7329 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7329 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7329
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3 |
|
| 3 |
| url |
VCID-9xr3-ty4u-ekeh |
| vulnerability_id |
VCID-9xr3-ty4u-ekeh |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7330 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7330 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7330
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh |
|
| 4 |
| url |
VCID-a6fx-tsy1-tuc1 |
| vulnerability_id |
VCID-a6fx-tsy1-tuc1 |
| summary |
wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71985 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71989 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7203 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72038 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72023 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72067 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7320
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1 |
|
| 5 |
| url |
VCID-ap24-btqx-j7eb |
| vulnerability_id |
VCID-ap24-btqx-j7eb |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7334
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb |
|
| 6 |
| url |
VCID-ardp-y1tu-t7fb |
| vulnerability_id |
VCID-ardp-y1tu-t7fb |
| summary |
wireshark: IPMI dissector crash in packet-ipmi-picmg.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7417 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60761 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.6079 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60811 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60797 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60779 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60827 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.608 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7417 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7417
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb |
|
| 7 |
| url |
VCID-bhf2-h1h2-tybb |
| vulnerability_id |
VCID-bhf2-h1h2-tybb |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7331 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.7979 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79679 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79707 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79692 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79733 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79727 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79756 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79757 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79761 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7331 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7331
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb |
|
| 8 |
| url |
VCID-cpjt-28ch-tub3 |
| vulnerability_id |
VCID-cpjt-28ch-tub3 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7324 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7324
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3 |
|
| 9 |
| url |
VCID-er4n-qs89-83ce |
| vulnerability_id |
VCID-er4n-qs89-83ce |
| summary |
wireshark: Pcapng file parser crash in pcapng.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7420 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83772 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83797 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7420 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7420
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce |
|
| 10 |
| url |
VCID-k15e-aq9v-5bg7 |
| vulnerability_id |
VCID-k15e-aq9v-5bg7 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7327 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7327 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7327
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7 |
|
| 11 |
| url |
VCID-kv7a-jf9y-q7dt |
| vulnerability_id |
VCID-kv7a-jf9y-q7dt |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7322 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7322
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt |
|
| 12 |
| url |
VCID-qmm9-abhm-4baz |
| vulnerability_id |
VCID-qmm9-abhm-4baz |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7328 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7328 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7328
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz |
|
| 13 |
| url |
VCID-qrsq-8eac-nfbw |
| vulnerability_id |
VCID-qrsq-8eac-nfbw |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62499 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62348 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62404 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.625 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62506 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62489 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7321 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7321
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw |
|
| 14 |
| url |
VCID-r8qg-5qpe-wka7 |
| vulnerability_id |
VCID-r8qg-5qpe-wka7 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7335
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7 |
|
| 15 |
| url |
VCID-twdt-u687-2ygs |
| vulnerability_id |
VCID-twdt-u687-2ygs |
| summary |
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62499 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62348 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62404 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.625 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62506 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62489 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7421 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7421
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-twdt-u687-2ygs |
|
| 16 |
| url |
VCID-v27j-rsag-73ce |
| vulnerability_id |
VCID-v27j-rsag-73ce |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7325 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59077 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.5915 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59139 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59222 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59226 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59206 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7325 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7325
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce |
|
| 17 |
| url |
VCID-vxc8-e3f6-53ab |
| vulnerability_id |
VCID-vxc8-e3f6-53ab |
| summary |
wireshark: DOCSIS dissector crash in packet-docsis.c by injecting a malformed packet |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7337 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71985 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71989 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7203 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72038 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72023 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72067 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7337 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7337
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vxc8-e3f6-53ab |
|
| 18 |
| url |
VCID-waws-7w8j-m7cv |
| vulnerability_id |
VCID-waws-7w8j-m7cv |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83772 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83797 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7419 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7419
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv |
|
| 19 |
| url |
VCID-wdq7-4pvq-nbdf |
| vulnerability_id |
VCID-wdq7-4pvq-nbdf |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7333 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7333 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7333
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf |
|
| 20 |
| url |
VCID-xhuq-918m-wket |
| vulnerability_id |
VCID-xhuq-918m-wket |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7332 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59052 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.58952 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59027 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59015 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59066 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.5909 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59053 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59088 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59093 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7332 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7332
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket |
|
| 21 |
| url |
VCID-yug7-qj7h-7bfb |
| vulnerability_id |
VCID-yug7-qj7h-7bfb |
| summary |
wireshark: FCP dissector crash in packet-fcp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7336 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77042 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77022 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77054 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77065 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77068 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77109 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77111 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77136 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7336 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7336
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb |
|
| 22 |
| url |
VCID-zb31-abbp-2yfp |
| vulnerability_id |
VCID-zb31-abbp-2yfp |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7326 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59878 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59903 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59873 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59923 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59936 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.5997 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7326 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7326
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp |
|