Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
Typedeb
Namespacedebian
Namewireshark
Version3.4.16-0+deb11u2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.6.0-1
Latest_non_vulnerable_version4.6.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-114w-j43h-p3ek
vulnerability_id VCID-114w-j43h-p3ek
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07172
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.19979
published_at 2026-04-24T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.2016
published_at 2026-04-12T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20102
published_at 2026-04-13T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20095
published_at 2026-04-16T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20099
published_at 2026-04-18T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20096
published_at 2026-04-21T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20318
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20179
published_at 2026-04-09T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20860
reference_id 20860
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20860
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
reference_id 2418573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-07.html
reference_id wnpa-sec-2025-07.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://www.wireshark.org/security/wnpa-sec-2025-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.2-1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2025-13945
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek
1
url VCID-2pgm-khz1-auay
vulnerability_id VCID-2pgm-khz1-auay
summary wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12415
published_at 2026-04-24T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12479
published_at 2026-04-11T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-12T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12401
published_at 2026-04-13T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12301
published_at 2026-04-18T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12413
published_at 2026-04-21T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-04T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-07T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12421
published_at 2026-04-08T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20884
reference_id 20884
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
reference_id 2418572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-08.html
reference_id wnpa-sec-2025-08.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://www.wireshark.org/security/wnpa-sec-2025-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.2-1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2025-13946
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay
2
url VCID-m58x-8cam-3fdy
vulnerability_id VCID-m58x-8cam-3fdy
summary wireshark: Improper Handling of Missing Values in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-04T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39441
published_at 2026-04-24T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-12T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39683
published_at 2026-04-13T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39732
published_at 2026-04-16T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39704
published_at 2026-04-18T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.3962
published_at 2026-04-21T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39657
published_at 2026-04-07T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39711
published_at 2026-04-08T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39725
published_at 2026-04-09T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39735
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20114
reference_id 20114
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20114
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
reference_id 2317746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-13.html
reference_id wnpa-sec-2024-13.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://www.wireshark.org/security/wnpa-sec-2024-13.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.1-1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-9781
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy
3
url VCID-qs6k-my1v-8qh4
vulnerability_id VCID-qs6k-my1v-8qh4
summary wireshark: Access of Uninitialized Pointer in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01289
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01284
published_at 2026-04-21T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-02T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.056
published_at 2026-04-11T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-13T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05531
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.0554
published_at 2026-04-18T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-04T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05566
published_at 2026-04-07T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-08T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20823
reference_id 20823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20823
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
reference_id 2416293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
6
reference_url https://access.redhat.com/errata/RHSA-2025:23083
reference_id RHSA-2025:23083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23083
7
reference_url https://access.redhat.com/errata/RHSA-2025:23142
reference_id RHSA-2025:23142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23142
8
reference_url https://access.redhat.com/errata/RHSA-2026:0432
reference_id RHSA-2026:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0432
9
reference_url https://access.redhat.com/errata/RHSA-2026:0433
reference_id RHSA-2026:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0433
10
reference_url https://access.redhat.com/errata/RHSA-2026:0452
reference_id RHSA-2026:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0452
11
reference_url https://access.redhat.com/errata/RHSA-2026:0454
reference_id RHSA-2026:0454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0454
12
reference_url https://access.redhat.com/errata/RHSA-2026:0483
reference_id RHSA-2026:0483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0483
13
reference_url https://www.wireshark.org/security/wnpa-sec-2025-06.html
reference_id wnpa-sec-2025-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://www.wireshark.org/security/wnpa-sec-2025-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.1-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.1-1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2025-13499
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4
4
url VCID-r54z-8gcg-pqg7
vulnerability_id VCID-r54z-8gcg-pqg7
summary wireshark: MONGO dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00858
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-24T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00846
published_at 2026-04-12T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00848
published_at 2026-04-13T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00847
published_at 2026-04-16T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00853
published_at 2026-04-18T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00902
published_at 2026-04-21T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-04T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-07T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-08T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-09T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
reference_id 1117852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20724
reference_id 20724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20724
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
reference_id 2403225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-04.html
reference_id wnpa-sec-2025-04.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://www.wireshark.org/security/wnpa-sec-2025-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.0-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.0-1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2025-11626
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7
5
url VCID-ra98-yk72-bkfq
vulnerability_id VCID-ra98-yk72-bkfq
summary wireshark: Buffer Overflow in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33964
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-24T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33924
published_at 2026-04-09T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33922
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.3388
published_at 2026-04-18T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33857
published_at 2026-04-13T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33895
published_at 2026-04-16T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33848
published_at 2026-04-21T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-04T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-08T12:55:00Z
10
value 0.00141
scoring_system epss
scoring_elements 0.34358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
reference_id 1107515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20509
reference_id 20509
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20509
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
reference_id 2370225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-02.html
reference_id wnpa-sec-2025-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://www.wireshark.org/security/wnpa-sec-2025-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.7-1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.7-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2025-5601
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq
6
url VCID-shbm-pwte-rkgt
vulnerability_id VCID-shbm-pwte-rkgt
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06244
published_at 2026-04-24T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06115
published_at 2026-04-12T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06108
published_at 2026-04-13T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.0607
published_at 2026-04-16T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06081
published_at 2026-04-18T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06229
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-11T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07571
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20214
reference_id 20214
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
reference_id 2327763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-15.html
reference_id wnpa-sec-2024-15.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://www.wireshark.org/security/wnpa-sec-2024-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.2-1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.2-1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2024-11596
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt
7
url VCID-wqn1-t4m4-wben
vulnerability_id VCID-wqn1-t4m4-wben
summary Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02731
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02824
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02725
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02708
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02719
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02832
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-07T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-08T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02775
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
reference_id 1125690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20944
reference_id 20944
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
reference_id 2429762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
7
reference_url https://www.wireshark.org/security/wnpa-sec-2026-04.html
reference_id wnpa-sec-2026-04.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://www.wireshark.org/security/wnpa-sec-2026-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/wireshark@3.4.16-0%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.13-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.13-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.3-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.3-1%3Fdistro=trixie
5
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
aliases CVE-2026-0960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.16-0%252Bdeb11u2%3Fdistro=trixie