Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
Typedeb
Namespacedebian
Namewireshark
Version3.4.16-0+deb11u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.4.16-0+deb11u2
Latest_non_vulnerable_version4.6.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-18xy-vuns-eqcx
vulnerability_id VCID-18xy-vuns-eqcx
summary wireshark: NFS dissector memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26205
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26045
published_at 2026-04-16T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26246
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26017
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26084
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26136
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26145
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.261
published_at 2026-04-12T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26041
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18628
reference_id 18628
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18628
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
reference_id 2165846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
reference_id CVE-2023-0417.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-02.html
reference_id wnpa-sec-2023-02.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://www.wireshark.org/security/wnpa-sec-2023-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0417
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx
1
url VCID-1b6n-9bub-1ueu
vulnerability_id VCID-1b6n-9bub-1ueu
summary wireshark: DoS (crash) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12537
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12312
published_at 2026-04-16T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12466
published_at 2026-04-08T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12517
published_at 2026-04-09T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.1249
published_at 2026-04-11T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-12T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12412
published_at 2026-04-13T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12579
published_at 2026-04-04T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19144
reference_id 19144
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19144
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
reference_id 2235813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-23.html
reference_id wnpa-sec-2023-23.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-23.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.8-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-4512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu
2
url VCID-1dz1-t49g-47bx
vulnerability_id VCID-1dz1-t49g-47bx
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0644
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06483
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06477
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0646
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06396
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
reference_id 2054047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-0586
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx
3
url VCID-23d3-1z9s-r7ht
vulnerability_id VCID-23d3-1z9s-r7ht
summary wireshark: iSCSI dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37254
published_at 2026-04-02T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37172
published_at 2026-04-16T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37281
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37162
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37176
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37186
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37152
published_at 2026-04-12T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18796
reference_id 18796
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18796
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
reference_id 2165844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
reference_id CVE-2023-0415.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-05.html
reference_id wnpa-sec-2023-05.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://www.wireshark.org/security/wnpa-sec-2023-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0415
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht
4
url VCID-2bjq-y76h-qbhd
vulnerability_id VCID-2bjq-y76h-qbhd
summary wireshark: T.38 dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26348
published_at 2026-04-16T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26385
published_at 2026-04-08T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26436
published_at 2026-04-09T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26444
published_at 2026-04-11T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26398
published_at 2026-04-12T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.2634
published_at 2026-04-13T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26493
published_at 2026-04-02T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26537
published_at 2026-04-04T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26318
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
reference_id 1068111
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19695
reference_id 19695
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19695
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
reference_id 2271741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-06.html
reference_id wnpa-sec-2024-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://www.wireshark.org/security/wnpa-sec-2024-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.4-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-2955
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd
5
url VCID-436x-av41-43g4
vulnerability_id VCID-436x-av41-43g4
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15607
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1565
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15714
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15485
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15572
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15627
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15591
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15555
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.1549
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15417
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
reference_id 2054049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-0585
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4
6
url VCID-63pm-hact-8ybw
vulnerability_id VCID-63pm-hact-8ybw
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22472
published_at 2026-04-16T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22511
published_at 2026-04-12T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-13T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-02T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2261
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-07T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22478
published_at 2026-04-08T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-09T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-11T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
reference_id 2054059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-0581
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw
7
url VCID-6exv-jrtx-8yab
vulnerability_id VCID-6exv-jrtx-8yab
summary wireshark: GNW dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17966
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17736
published_at 2026-04-16T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1772
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.1784
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18779
reference_id 18779
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18779
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
reference_id 2165845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
reference_id CVE-2023-0416.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
7
reference_url https://www.wireshark.org/security/wnpa-sec-2023-04.html
reference_id wnpa-sec-2023-04.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://www.wireshark.org/security/wnpa-sec-2023-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0416
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab
8
url VCID-9b6w-s1cn-57hz
vulnerability_id VCID-9b6w-s1cn-57hz
summary wireshark: dissection engine crash via conversation tracking module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-02T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34827
published_at 2026-04-16T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-04T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34774
published_at 2026-04-07T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34818
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-09T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34851
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34813
published_at 2026-04-12T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34789
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18766
reference_id 18766
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18766
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
reference_id 2165842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
reference_id CVE-2023-0413.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-03.html
reference_id wnpa-sec-2023-03.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-03.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0413
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz
9
url VCID-a9rv-3ka3-67fr
vulnerability_id VCID-a9rv-3ka3-67fr
summary Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04174
published_at 2026-04-04T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04189
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.0497
published_at 2026-04-16T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05073
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05063
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05045
published_at 2026-04-12T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05028
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19105
reference_id 19105
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19105
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-21.html
reference_id wnpa-sec-2023-21.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://www.wireshark.org/security/wnpa-sec-2023-21.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.7-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.7-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-3648
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr
10
url VCID-beux-z8f3-bbg4
vulnerability_id VCID-beux-z8f3-bbg4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13035
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-16T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13088
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12889
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12968
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13019
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12943
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19083
reference_id 19083
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19083
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
reference_id 2210824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
reference_id CVE-2023-2856.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-16.html
reference_id wnpa-sec-2023-16.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.wireshark.org/security/wnpa-sec-2023-16.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2856
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4
11
url VCID-ce6b-zqtu-jkdt
vulnerability_id VCID-ce6b-zqtu-jkdt
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20269
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20329
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20133
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20215
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20105
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
reference_id 2054056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-0582
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt
12
url VCID-cvch-5rbz-gyah
vulnerability_id VCID-cvch-5rbz-gyah
summary wireshark: NetScreen File Parsing Heap-based Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13994
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13768
published_at 2026-04-16T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13937
published_at 2026-04-08T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13989
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13946
published_at 2026-04-11T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13909
published_at 2026-04-12T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13861
published_at 2026-04-13T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14049
published_at 2026-04-04T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13852
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19404
reference_id 19404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19404
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
reference_id 2250151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-29.html
reference_id wnpa-sec-2023-29.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://www.wireshark.org/security/wnpa-sec-2023-29.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-6175
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah
13
url VCID-d1fd-fcrt-j7bj
vulnerability_id VCID-d1fd-fcrt-j7bj
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81894
published_at 2026-04-02T12:55:00Z
1
value 0.01852
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-16T12:55:00Z
2
value 0.01852
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-04T12:55:00Z
3
value 0.01852
scoring_system epss
scoring_elements 0.82966
published_at 2026-04-07T12:55:00Z
4
value 0.01852
scoring_system epss
scoring_elements 0.8299
published_at 2026-04-08T12:55:00Z
5
value 0.01852
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-09T12:55:00Z
6
value 0.01852
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-11T12:55:00Z
7
value 0.01852
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-12T12:55:00Z
8
value 0.01852
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19085
reference_id 19085
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19085
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
reference_id 2210832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
6
reference_url https://takeonme.org/cves/CVE-2023-0666.html
reference_id CVE-2023-0666.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://takeonme.org/cves/CVE-2023-0666.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
11
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-18.html
reference_id wnpa-sec-2023-18.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/security/wnpa-sec-2023-18.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0666
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj
14
url VCID-d95z-wdv1-yye6
vulnerability_id VCID-d95z-wdv1-yye6
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42382
published_at 2026-04-02T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45765
published_at 2026-04-16T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45714
published_at 2026-04-09T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45662
published_at 2026-04-07T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45718
published_at 2026-04-08T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45737
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45707
published_at 2026-04-12T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19086
reference_id 19086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19086
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
reference_id 2229692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
6
reference_url https://takeonme.org/cves/CVE-2023-0667.html
reference_id CVE-2023-0667.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://takeonme.org/cves/CVE-2023-0667.html
7
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://security.gentoo.org/glsa/202309-02
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0667
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6
15
url VCID-dc45-d39b-u7bt
vulnerability_id VCID-dc45-d39b-u7bt
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
reference_id
reference_type
scores
0
value 0.00299
scoring_system epss
scoring_elements 0.53195
published_at 2026-04-02T12:55:00Z
1
value 0.00299
scoring_system epss
scoring_elements 0.53291
published_at 2026-04-16T12:55:00Z
2
value 0.00299
scoring_system epss
scoring_elements 0.53219
published_at 2026-04-04T12:55:00Z
3
value 0.00299
scoring_system epss
scoring_elements 0.53187
published_at 2026-04-07T12:55:00Z
4
value 0.00299
scoring_system epss
scoring_elements 0.5324
published_at 2026-04-08T12:55:00Z
5
value 0.00299
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-09T12:55:00Z
6
value 0.00299
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-11T12:55:00Z
7
value 0.00299
scoring_system epss
scoring_elements 0.5327
published_at 2026-04-12T12:55:00Z
8
value 0.00299
scoring_system epss
scoring_elements 0.53253
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18852
reference_id 18852
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18852
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
reference_id 2186329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
reference_id CVE-2023-1992.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-09.html
reference_id wnpa-sec-2023-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.wireshark.org/security/wnpa-sec-2023-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-1992
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt
16
url VCID-dy74-uv3r-x7bs
vulnerability_id VCID-dy74-uv3r-x7bs
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41482
published_at 2026-04-12T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41512
published_at 2026-04-16T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41509
published_at 2026-04-04T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41435
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41485
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41494
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41514
published_at 2026-04-11T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.41467
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
reference_id 1033756
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18839
reference_id 18839
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18839
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
reference_id 2176452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
reference_id CVE-2023-1161.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://security.gentoo.org/glsa/202309-02
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-08.html
reference_id wnpa-sec-2023-08.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.wireshark.org/security/wnpa-sec-2023-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-1161
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs
17
url VCID-eed3-ztv5-yqg9
vulnerability_id VCID-eed3-ztv5-yqg9
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50432
published_at 2026-04-02T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50461
published_at 2026-04-09T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50502
published_at 2026-04-11T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-08T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50414
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5048
published_at 2026-04-12T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52132
published_at 2026-04-16T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18947
reference_id 18947
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18947
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
reference_id 2186325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
reference_id CVE-2023-1994.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-11.html
reference_id wnpa-sec-2023-11.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-1994
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9
18
url VCID-end1-k29u-m7g8
vulnerability_id VCID-end1-k29u-m7g8
summary wireshark: NTLMSSP dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09056
published_at 2026-04-16T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09174
published_at 2026-04-08T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09204
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09176
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-13T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09117
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0917
published_at 2026-04-04T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
reference_id 1080298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19943
reference_id 19943
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19943
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
reference_id 2308421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-11.html
reference_id wnpa-sec-2024-11.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://www.wireshark.org/security/wnpa-sec-2024-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.0-1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.0-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-8250
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8
19
url VCID-eqkh-wnhk-5fdh
vulnerability_id VCID-eqkh-wnhk-5fdh
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32147
published_at 2026-04-01T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32279
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32141
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32218
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-12T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32149
published_at 2026-04-13T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32183
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
reference_id 2039013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.0-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.0-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4186
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh
20
url VCID-fve5-m93p-vbf3
vulnerability_id VCID-fve5-m93p-vbf3
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
reference_id
reference_type
scores
0
value 0.00259
scoring_system epss
scoring_elements 0.49241
published_at 2026-04-02T12:55:00Z
1
value 0.00259
scoring_system epss
scoring_elements 0.49316
published_at 2026-04-16T12:55:00Z
2
value 0.00259
scoring_system epss
scoring_elements 0.49269
published_at 2026-04-13T12:55:00Z
3
value 0.00259
scoring_system epss
scoring_elements 0.49221
published_at 2026-04-07T12:55:00Z
4
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-08T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49272
published_at 2026-04-09T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.4929
published_at 2026-04-11T12:55:00Z
7
value 0.00259
scoring_system epss
scoring_elements 0.49264
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18900
reference_id 18900
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18900
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
reference_id 2186327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
reference_id CVE-2023-1993.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-10.html
reference_id wnpa-sec-2023-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.wireshark.org/security/wnpa-sec-2023-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-1993
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3
21
url VCID-g38d-wdq8-sfgv
vulnerability_id VCID-g38d-wdq8-sfgv
summary wireshark: GVCP dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09756
published_at 2026-04-16T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09867
published_at 2026-04-08T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09919
published_at 2026-04-09T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09926
published_at 2026-04-11T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09889
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-13T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09846
published_at 2026-04-02T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09897
published_at 2026-04-04T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09794
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19496
reference_id 19496
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19496
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
reference_id 2256659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-01.html
reference_id wnpa-sec-2024-01.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://www.wireshark.org/security/wnpa-sec-2024-01.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.2-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-0208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv
22
url VCID-h36t-f662-4ufw
vulnerability_id VCID-h36t-f662-4ufw
summary wireshark: Editcap byte chopping crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18938
published_at 2026-04-16T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19082
published_at 2026-04-11T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19036
published_at 2026-04-12T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-13T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19503
published_at 2026-04-09T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19605
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19652
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19373
published_at 2026-04-07T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19724
reference_id 19724
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19724
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
reference_id 2280718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-08.html
reference_id wnpa-sec-2024-08.html
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://www.wireshark.org/security/wnpa-sec-2024-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.5-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.5-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-4853
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw
23
url VCID-h51a-cp8r-r3fx
vulnerability_id VCID-h51a-cp8r-r3fx
summary wireshark: TIPC dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-02T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.432
published_at 2026-04-16T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43164
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43102
published_at 2026-04-07T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43155
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-09T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43189
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43156
published_at 2026-04-12T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18770
reference_id 18770
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18770
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
reference_id 2165841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
reference_id CVE-2023-0412.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-07.html
reference_id wnpa-sec-2023-07.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://www.wireshark.org/security/wnpa-sec-2023-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0412
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx
24
url VCID-jka6-e5fr-rkcv
vulnerability_id VCID-jka6-e5fr-rkcv
summary wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26301
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26137
published_at 2026-04-16T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26341
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26113
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.2618
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26228
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26236
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26191
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
reference_id 2160659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
reference_id CVE-2022-4345.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
6
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
9
reference_url https://www.wireshark.org/security/wnpa-sec-2022-09.html
reference_id wnpa-sec-2022-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://www.wireshark.org/security/wnpa-sec-2022-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-4345
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv
25
url VCID-jknb-n171-8udz
vulnerability_id VCID-jknb-n171-8udz
summary wireshark: possible Denial of Service via crafted package
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43749
published_at 2026-04-02T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43794
published_at 2026-04-16T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43708
published_at 2026-04-07T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43758
published_at 2026-04-08T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43761
published_at 2026-04-09T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43781
published_at 2026-04-11T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43748
published_at 2026-04-12T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43732
published_at 2026-04-13T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43774
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19229
reference_id 19229
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19229
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
reference_id 2235363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
reference_id 6HCUPLDY7HLPO46PHMGIJSUBJFTT237C
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
7
reference_url https://takeonme.org/cves/CVE-2023-2906.html
reference_id CVE-2023-2906.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://takeonme.org/cves/CVE-2023-2906.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
reference_id L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
reference_id TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.8-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2906
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz
26
url VCID-k49z-j5v1-pkhf
vulnerability_id VCID-k49z-j5v1-pkhf
summary iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06464
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07402
published_at 2026-04-16T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07504
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19164
reference_id 19164
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19164
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-22.html
reference_id wnpa-sec-2023-22.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://www.wireshark.org/security/wnpa-sec-2023-22.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.7-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.7-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-3649
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf
27
url VCID-k6r8-3ckd-87bf
vulnerability_id VCID-k6r8-3ckd-87bf
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08931
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08862
published_at 2026-04-16T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08981
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08911
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08989
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09021
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0902
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08983
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08971
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19100
reference_id 19100
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19100
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
reference_id 2211406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
reference_id CVE-2023-2952.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-20.html
reference_id wnpa-sec-2023-20.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.wireshark.org/security/wnpa-sec-2023-20.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2952
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf
28
url VCID-kpe5-12b6-pbes
vulnerability_id VCID-kpe5-12b6-pbes
summary wireshark: MONGO and ZigBee TLV dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71126
published_at 2026-04-16T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.7104
published_at 2026-04-02T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71058
published_at 2026-04-04T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71032
published_at 2026-04-07T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71075
published_at 2026-04-08T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71087
published_at 2026-04-09T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71111
published_at 2026-04-11T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-12T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71079
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
reference_id 15047
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
5
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
reference_id 15499
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19726
reference_id 19726
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19726
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
reference_id 2280715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
8
reference_url https://www.wireshark.org/security/wnpa-sec-2024-07.html
reference_id wnpa-sec-2024-07.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://www.wireshark.org/security/wnpa-sec-2024-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.5-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.5-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-4854
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes
29
url VCID-ksm5-9amq-aqg1
vulnerability_id VCID-ksm5-9amq-aqg1
summary wireshark: DoS (memory leak) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05748
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05782
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05821
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05845
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05824
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05809
published_at 2026-04-13T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05773
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
reference_id 2235814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.8-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-4513
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1
30
url VCID-ktks-hvzs-c7ep
vulnerability_id VCID-ktks-hvzs-c7ep
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12846
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12898
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12703
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12834
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12763
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12716
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.1262
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
reference_id 2039005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep
31
url VCID-ky3g-7wfh-v7fz
vulnerability_id VCID-ky3g-7wfh-v7fz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39516
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39455
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39525
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39536
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39498
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39481
published_at 2026-04-13T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39531
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
reference_id 2039000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz
32
url VCID-ne4k-vht4-rue7
vulnerability_id VCID-ne4k-vht4-rue7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23229
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23313
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23334
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23239
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23255
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
reference_id 2054051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-0583
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7
33
url VCID-p3ew-pwr9-7yek
vulnerability_id VCID-p3ew-pwr9-7yek
summary wireshark: kafka dissector memory exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33373
published_at 2026-04-16T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33479
published_at 2026-04-04T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-07T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33365
published_at 2026-04-08T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33399
published_at 2026-04-09T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33403
published_at 2026-04-11T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33361
published_at 2026-04-12T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33339
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
reference_id 2160658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
reference_id CVE-2022-4344.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
8
reference_url https://www.wireshark.org/security/wnpa-sec-2022-10.html
reference_id wnpa-sec-2022-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://www.wireshark.org/security/wnpa-sec-2022-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-4344
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek
34
url VCID-prdk-zfnn-cyg3
vulnerability_id VCID-prdk-zfnn-cyg3
summary wireshark: f5ethtrailer Infinite loop in legacy style dissector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05321
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05371
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05384
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05327
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
reference_id 2152061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
5
reference_url https://access.redhat.com/errata/RHSA-2023:2373
reference_id RHSA-2023:2373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2373
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.8-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.8-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2022-3190
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3
35
url VCID-prz6-jk3b-wbhw
vulnerability_id VCID-prz6-jk3b-wbhw
summary wireshark: Multiple dissector excessive loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25256
published_at 2026-04-02T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25112
published_at 2026-04-16T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25294
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25067
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25137
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25182
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25197
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25154
published_at 2026-04-12T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25101
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18711
reference_id 18711
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18711
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18720
reference_id 18720
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18720
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18737
reference_id 18737
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18737
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
reference_id 2165825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
8
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
reference_id CVE-2023-0411.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
9
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-06.html
reference_id wnpa-sec-2023-06.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://www.wireshark.org/security/wnpa-sec-2023-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.3-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0411
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw
36
url VCID-r9dr-xdt4-vke2
vulnerability_id VCID-r9dr-xdt4-vke2
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.17948
published_at 2026-04-16T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19062
reference_id 19062
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19062
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
reference_id 2210822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
reference_id CVE-2023-2855.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-12.html
reference_id wnpa-sec-2023-12.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.wireshark.org/security/wnpa-sec-2023-12.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2855
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2
37
url VCID-s3e9-4cud-ufdn
vulnerability_id VCID-s3e9-4cud-ufdn
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31126
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31174
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31049
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31078
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31085
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31041
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-13T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.31027
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
reference_id 2039029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4190
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn
38
url VCID-sj7t-z4pv-7ucz
vulnerability_id VCID-sj7t-z4pv-7ucz
summary wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12554
published_at 2026-04-16T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12711
published_at 2026-04-08T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12764
published_at 2026-04-09T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12733
published_at 2026-04-11T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-12T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12647
published_at 2026-04-13T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12783
published_at 2026-04-02T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1283
published_at 2026-04-04T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12633
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19501
reference_id 19501
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19501
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
reference_id 2256656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-02.html
reference_id wnpa-sec-2024-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://www.wireshark.org/security/wnpa-sec-2024-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.2-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-0209
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz
39
url VCID-t7vh-m6cf-rfef
vulnerability_id VCID-t7vh-m6cf-rfef
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29776
published_at 2026-04-16T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29933
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29748
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2981
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29845
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29854
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19068
reference_id 19068
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19068
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
reference_id 2210466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
reference_id CVE-2023-2879.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-14.html
reference_id wnpa-sec-2023-14.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.wireshark.org/security/wnpa-sec-2023-14.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2879
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef
40
url VCID-tk9u-gtk1-v3hm
vulnerability_id VCID-tk9u-gtk1-v3hm
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32366
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32515
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3255
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32373
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32422
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32449
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32453
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32414
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32387
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32423
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
reference_id 2039011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm
41
url VCID-tvmn-b999-xya7
vulnerability_id VCID-tvmn-b999-xya7
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.17948
published_at 2026-04-16T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19081
reference_id 19081
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19081
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
reference_id 2210829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
reference_id CVE-2023-2858.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-15.html
reference_id wnpa-sec-2023-15.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.wireshark.org/security/wnpa-sec-2023-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-2858
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7
42
url VCID-tyxd-yfmx-z7d7
vulnerability_id VCID-tyxd-yfmx-z7d7
summary SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23401
published_at 2026-04-16T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23406
published_at 2026-04-08T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23457
published_at 2026-04-09T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23476
published_at 2026-04-11T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-12T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23382
published_at 2026-04-13T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.2355
published_at 2026-04-04T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19559
reference_id 19559
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19559
4
reference_url https://www.wireshark.org/security/wnpa-sec-2024-10.html
reference_id wnpa-sec-2024-10.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://www.wireshark.org/security/wnpa-sec-2024-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-8645
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7
43
url VCID-u22d-aazu-6khn
vulnerability_id VCID-u22d-aazu-6khn
summary wireshark: DoS (infinite loop) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01362
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01367
published_at 2026-04-13T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01377
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01382
published_at 2026-04-09T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01371
published_at 2026-04-11T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01365
published_at 2026-04-12T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01358
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
reference_id 2235812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.8-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.11-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.11-1~deb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-4511
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn
44
url VCID-vbn8-ghgq-n7g1
vulnerability_id VCID-vbn8-ghgq-n7g1
summary wireshark: DOCSIS dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24125
published_at 2026-04-16T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24146
published_at 2026-04-08T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24191
published_at 2026-04-09T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24209
published_at 2026-04-11T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24167
published_at 2026-04-12T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.2411
published_at 2026-04-13T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2426
published_at 2026-04-02T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24294
published_at 2026-04-04T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24079
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19557
reference_id 19557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19557
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
reference_id 2256652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-05.html
reference_id wnpa-sec-2024-05.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://www.wireshark.org/security/wnpa-sec-2024-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.2.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.2.2-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-0211
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1
45
url VCID-whve-rre4-fbgr
vulnerability_id VCID-whve-rre4-fbgr
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53933
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5395
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53953
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54033
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-13T12:55:00Z
8
value 0.00308
scoring_system epss
scoring_elements 0.54056
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
reference_id 2039009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.6.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2021-4184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr
46
url VCID-ycu3-e7vh-2qc4
vulnerability_id VCID-ycu3-e7vh-2qc4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-02T12:55:00Z
1
value 0.01371
scoring_system epss
scoring_elements 0.80247
published_at 2026-04-16T12:55:00Z
2
value 0.01371
scoring_system epss
scoring_elements 0.80194
published_at 2026-04-04T12:55:00Z
3
value 0.01371
scoring_system epss
scoring_elements 0.80183
published_at 2026-04-07T12:55:00Z
4
value 0.01371
scoring_system epss
scoring_elements 0.8021
published_at 2026-04-08T12:55:00Z
5
value 0.01371
scoring_system epss
scoring_elements 0.80219
published_at 2026-04-13T12:55:00Z
6
value 0.01371
scoring_system epss
scoring_elements 0.80238
published_at 2026-04-11T12:55:00Z
7
value 0.01371
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19087
reference_id 19087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19087
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
reference_id 2210835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
6
reference_url https://takeonme.org/cves/CVE-2023-0668.html
reference_id CVE-2023-0668.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://takeonme.org/cves/CVE-2023-0668.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-19.html
reference_id wnpa-sec-2023-19.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-19.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.6-1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2023-0668
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u1%3Fdistro=trixie