Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@2.4.5-1?distro=trixie
Typedeb
Namespacedebian
Namewireshark
Version2.4.5-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.6-1
Latest_non_vulnerable_version4.6.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1her-1nh5-57cx
vulnerability_id VCID-1her-1nh5-57cx
summary wireshark: SIGCOMP dissector crash in packet-sigcomp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7418
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549305
reference_id 1549305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549305
5
reference_url https://access.redhat.com/errata/RHSA-2020:1047
reference_id RHSA-2020:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1047
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7418
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx
1
url VCID-1ndt-2ndw-mug2
vulnerability_id VCID-1ndt-2ndw-mug2
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7323
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-04-12T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7323
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2
2
url VCID-9g71-v5zu-tqg3
vulnerability_id VCID-9g71-v5zu-tqg3
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7329
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7329
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7329
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3
3
url VCID-9xr3-ty4u-ekeh
vulnerability_id VCID-9xr3-ty4u-ekeh
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7330
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7330
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7330
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh
4
url VCID-a6fx-tsy1-tuc1
vulnerability_id VCID-a6fx-tsy1-tuc1
summary wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7320
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71951
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.7197
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71997
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72021
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72005
published_at 2026-04-12T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71989
published_at 2026-04-13T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.7203
published_at 2026-04-16T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72038
published_at 2026-04-18T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-21T12:55:00Z
12
value 0.007
scoring_system epss
scoring_elements 0.72067
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7320
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549277
reference_id 1549277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549277
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7320
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1
5
url VCID-ap24-btqx-j7eb
vulnerability_id VCID-ap24-btqx-j7eb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7334
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7334
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549255
reference_id 1549255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549255
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7334
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb
6
url VCID-ardp-y1tu-t7fb
vulnerability_id VCID-ardp-y1tu-t7fb
summary wireshark: IPMI dissector crash in packet-ipmi-picmg.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7417
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60658
published_at 2026-04-01T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60731
published_at 2026-04-02T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60726
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60774
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6079
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60811
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60797
published_at 2026-04-12T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60779
published_at 2026-04-13T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60821
published_at 2026-04-16T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.60827
published_at 2026-04-18T12:55:00Z
11
value 0.00401
scoring_system epss
scoring_elements 0.60812
published_at 2026-04-21T12:55:00Z
12
value 0.00401
scoring_system epss
scoring_elements 0.608
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549301
reference_id 1549301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549301
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7417
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb
7
url VCID-bhf2-h1h2-tybb
vulnerability_id VCID-bhf2-h1h2-tybb
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7331
reference_id
reference_type
scores
0
value 0.01301
scoring_system epss
scoring_elements 0.7979
published_at 2026-04-24T12:55:00Z
1
value 0.01301
scoring_system epss
scoring_elements 0.79679
published_at 2026-04-01T12:55:00Z
2
value 0.01301
scoring_system epss
scoring_elements 0.79686
published_at 2026-04-02T12:55:00Z
3
value 0.01301
scoring_system epss
scoring_elements 0.79707
published_at 2026-04-04T12:55:00Z
4
value 0.01301
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-07T12:55:00Z
5
value 0.01301
scoring_system epss
scoring_elements 0.79721
published_at 2026-04-08T12:55:00Z
6
value 0.01301
scoring_system epss
scoring_elements 0.79728
published_at 2026-04-09T12:55:00Z
7
value 0.01301
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-11T12:55:00Z
8
value 0.01301
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-12T12:55:00Z
9
value 0.01301
scoring_system epss
scoring_elements 0.79727
published_at 2026-04-13T12:55:00Z
10
value 0.01301
scoring_system epss
scoring_elements 0.79756
published_at 2026-04-16T12:55:00Z
11
value 0.01301
scoring_system epss
scoring_elements 0.79757
published_at 2026-04-18T12:55:00Z
12
value 0.01301
scoring_system epss
scoring_elements 0.79761
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7331
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb
8
url VCID-cpjt-28ch-tub3
vulnerability_id VCID-cpjt-28ch-tub3
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7324
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-04-12T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7324
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7324
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3
9
url VCID-er4n-qs89-83ce
vulnerability_id VCID-er4n-qs89-83ce
summary wireshark: Pcapng file parser crash in pcapng.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7420
reference_id
reference_type
scores
0
value 0.02017
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-01T12:55:00Z
1
value 0.02017
scoring_system epss
scoring_elements 0.83685
published_at 2026-04-02T12:55:00Z
2
value 0.02017
scoring_system epss
scoring_elements 0.837
published_at 2026-04-04T12:55:00Z
3
value 0.02017
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-07T12:55:00Z
4
value 0.02017
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-08T12:55:00Z
5
value 0.02017
scoring_system epss
scoring_elements 0.83733
published_at 2026-04-09T12:55:00Z
6
value 0.02017
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-11T12:55:00Z
7
value 0.02017
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-12T12:55:00Z
8
value 0.02017
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-13T12:55:00Z
9
value 0.02017
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-16T12:55:00Z
10
value 0.02017
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-21T12:55:00Z
11
value 0.02017
scoring_system epss
scoring_elements 0.83797
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549284
reference_id 1549284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549284
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7420
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce
10
url VCID-k15e-aq9v-5bg7
vulnerability_id VCID-k15e-aq9v-5bg7
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7327
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7327
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7
11
url VCID-kv7a-jf9y-q7dt
vulnerability_id VCID-kv7a-jf9y-q7dt
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7322
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-04-12T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7322
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt
12
url VCID-qmm9-abhm-4baz
vulnerability_id VCID-qmm9-abhm-4baz
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7328
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7328
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7328
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz
13
url VCID-qrsq-8eac-nfbw
vulnerability_id VCID-qrsq-8eac-nfbw
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7321
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62499
published_at 2026-04-24T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62348
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62407
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62438
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62404
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62453
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62488
published_at 2026-04-11T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62477
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62455
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.625
published_at 2026-04-16T12:55:00Z
11
value 0.00428
scoring_system epss
scoring_elements 0.62506
published_at 2026-04-18T12:55:00Z
12
value 0.00428
scoring_system epss
scoring_elements 0.62489
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7321
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw
14
url VCID-r8qg-5qpe-wka7
vulnerability_id VCID-r8qg-5qpe-wka7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7335
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549244
reference_id 1549244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549244
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7335
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7
15
url VCID-twdt-u687-2ygs
vulnerability_id VCID-twdt-u687-2ygs
summary In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7421
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62499
published_at 2026-04-24T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62348
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62407
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62438
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62404
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62453
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62488
published_at 2026-04-11T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62477
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62455
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.625
published_at 2026-04-16T12:55:00Z
11
value 0.00428
scoring_system epss
scoring_elements 0.62506
published_at 2026-04-18T12:55:00Z
12
value 0.00428
scoring_system epss
scoring_elements 0.62489
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7421
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7421
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7421
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twdt-u687-2ygs
16
url VCID-v27j-rsag-73ce
vulnerability_id VCID-v27j-rsag-73ce
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7325
reference_id
reference_type
scores
0
value 0.00376
scoring_system epss
scoring_elements 0.59188
published_at 2026-04-24T12:55:00Z
1
value 0.00376
scoring_system epss
scoring_elements 0.59077
published_at 2026-04-01T12:55:00Z
2
value 0.00376
scoring_system epss
scoring_elements 0.5915
published_at 2026-04-02T12:55:00Z
3
value 0.00376
scoring_system epss
scoring_elements 0.59174
published_at 2026-04-04T12:55:00Z
4
value 0.00376
scoring_system epss
scoring_elements 0.59139
published_at 2026-04-07T12:55:00Z
5
value 0.00376
scoring_system epss
scoring_elements 0.59189
published_at 2026-04-08T12:55:00Z
6
value 0.00376
scoring_system epss
scoring_elements 0.59202
published_at 2026-04-09T12:55:00Z
7
value 0.00376
scoring_system epss
scoring_elements 0.59222
published_at 2026-04-11T12:55:00Z
8
value 0.00376
scoring_system epss
scoring_elements 0.59204
published_at 2026-04-12T12:55:00Z
9
value 0.00376
scoring_system epss
scoring_elements 0.59185
published_at 2026-04-13T12:55:00Z
10
value 0.00376
scoring_system epss
scoring_elements 0.59221
published_at 2026-04-16T12:55:00Z
11
value 0.00376
scoring_system epss
scoring_elements 0.59226
published_at 2026-04-18T12:55:00Z
12
value 0.00376
scoring_system epss
scoring_elements 0.59206
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7325
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce
17
url VCID-vxc8-e3f6-53ab
vulnerability_id VCID-vxc8-e3f6-53ab
summary wireshark: DOCSIS dissector crash in packet-docsis.c by injecting a malformed packet
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7337.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7337
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71951
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.7197
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71997
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72021
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72005
published_at 2026-04-12T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71989
published_at 2026-04-13T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.7203
published_at 2026-04-16T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72038
published_at 2026-04-18T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-21T12:55:00Z
12
value 0.007
scoring_system epss
scoring_elements 0.72067
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549265
reference_id 1549265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549265
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7337
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxc8-e3f6-53ab
18
url VCID-waws-7w8j-m7cv
vulnerability_id VCID-waws-7w8j-m7cv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7419
reference_id
reference_type
scores
0
value 0.02017
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-01T12:55:00Z
1
value 0.02017
scoring_system epss
scoring_elements 0.83685
published_at 2026-04-02T12:55:00Z
2
value 0.02017
scoring_system epss
scoring_elements 0.837
published_at 2026-04-04T12:55:00Z
3
value 0.02017
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-07T12:55:00Z
4
value 0.02017
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-08T12:55:00Z
5
value 0.02017
scoring_system epss
scoring_elements 0.83733
published_at 2026-04-09T12:55:00Z
6
value 0.02017
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-11T12:55:00Z
7
value 0.02017
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-12T12:55:00Z
8
value 0.02017
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-13T12:55:00Z
9
value 0.02017
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-16T12:55:00Z
10
value 0.02017
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-21T12:55:00Z
11
value 0.02017
scoring_system epss
scoring_elements 0.83797
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549308
reference_id 1549308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549308
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7419
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv
19
url VCID-wdq7-4pvq-nbdf
vulnerability_id VCID-wdq7-4pvq-nbdf
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7333
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7333
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7333
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf
20
url VCID-xhuq-918m-wket
vulnerability_id VCID-xhuq-918m-wket
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7332
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.59052
published_at 2026-04-24T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.58952
published_at 2026-04-01T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.59027
published_at 2026-04-02T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.59049
published_at 2026-04-04T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59015
published_at 2026-04-07T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59066
published_at 2026-04-08T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.59072
published_at 2026-04-21T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.5909
published_at 2026-04-11T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-13T12:55:00Z
9
value 0.00374
scoring_system epss
scoring_elements 0.59088
published_at 2026-04-16T12:55:00Z
10
value 0.00374
scoring_system epss
scoring_elements 0.59093
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7332
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7332
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket
21
url VCID-yug7-qj7h-7bfb
vulnerability_id VCID-yug7-qj7h-7bfb
summary wireshark: FCP dissector crash in packet-fcp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7336
reference_id
reference_type
scores
0
value 0.01008
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-01T12:55:00Z
1
value 0.01008
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-02T12:55:00Z
2
value 0.01008
scoring_system epss
scoring_elements 0.77042
published_at 2026-04-04T12:55:00Z
3
value 0.01008
scoring_system epss
scoring_elements 0.77022
published_at 2026-04-07T12:55:00Z
4
value 0.01008
scoring_system epss
scoring_elements 0.77054
published_at 2026-04-08T12:55:00Z
5
value 0.01008
scoring_system epss
scoring_elements 0.77065
published_at 2026-04-09T12:55:00Z
6
value 0.01008
scoring_system epss
scoring_elements 0.77093
published_at 2026-04-11T12:55:00Z
7
value 0.01008
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-12T12:55:00Z
8
value 0.01008
scoring_system epss
scoring_elements 0.77068
published_at 2026-04-13T12:55:00Z
9
value 0.01008
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-16T12:55:00Z
10
value 0.01008
scoring_system epss
scoring_elements 0.77111
published_at 2026-04-18T12:55:00Z
11
value 0.01008
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-21T12:55:00Z
12
value 0.01008
scoring_system epss
scoring_elements 0.77136
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549270
reference_id 1549270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549270
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7336
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb
22
url VCID-zb31-abbp-2yfp
vulnerability_id VCID-zb31-abbp-2yfp
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7326
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.59955
published_at 2026-04-21T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59801
published_at 2026-04-01T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59878
published_at 2026-04-02T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59903
published_at 2026-04-04T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59873
published_at 2026-04-07T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59923
published_at 2026-04-08T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59936
published_at 2026-04-09T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.59958
published_at 2026-04-11T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.59942
published_at 2026-04-12T12:55:00Z
9
value 0.00388
scoring_system epss
scoring_elements 0.59924
published_at 2026-04-24T12:55:00Z
10
value 0.00388
scoring_system epss
scoring_elements 0.59963
published_at 2026-04-16T12:55:00Z
11
value 0.00388
scoring_system epss
scoring_elements 0.5997
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7326
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
purl pkg:deb/debian/wireshark@2.4.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2018-7326
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.4.5-1%3Fdistro=trixie