Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
Typedeb
Namespacedebian
Namewireshark
Version4.0.17-0+deb12u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.4.14-0+deb13u1
Latest_non_vulnerable_version4.4.14-0+deb13u1
Affected_by_vulnerabilities
0
url VCID-114w-j43h-p3ek
vulnerability_id VCID-114w-j43h-p3ek
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07172
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20102
published_at 2026-04-13T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20179
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2016
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20318
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20860
reference_id 20860
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20860
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
reference_id 2418573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-07.html
reference_id wnpa-sec-2025-07.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://www.wireshark.org/security/wnpa-sec-2025-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13945
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek
1
url VCID-2pgm-khz1-auay
vulnerability_id VCID-2pgm-khz1-auay
summary wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12401
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12421
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12479
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20884
reference_id 20884
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
reference_id 2418572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-08.html
reference_id wnpa-sec-2025-08.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://www.wireshark.org/security/wnpa-sec-2025-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13946
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay
2
url VCID-9jam-asdr-cyec
vulnerability_id VCID-9jam-asdr-cyec
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3201
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10216
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10281
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10178
published_at 2026-04-07T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14636
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14619
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14676
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14598
published_at 2026-04-12T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14537
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3201
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20972
reference_id 20972
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442641
reference_id 2442641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442641
5
reference_url https://www.wireshark.org/security/wnpa-sec-2026-05.html
reference_id wnpa-sec-2026-05.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/
url https://www.wireshark.org/security/wnpa-sec-2026-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-3201
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec
3
url VCID-kdgd-xdqb-9khz
vulnerability_id VCID-kdgd-xdqb-9khz
summary wireshark: Uncontrolled Recursion in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1492
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15595
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15662
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16099
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16075
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.1616
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16224
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16207
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16167
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1492
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20373
reference_id 20373
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20373
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346737
reference_id 2346737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346737
5
reference_url https://access.redhat.com/errata/RHSA-2025:9121
reference_id RHSA-2025:9121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9121
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-01.html
reference_id wnpa-sec-2025-01.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/
url https://www.wireshark.org/security/wnpa-sec-2025-01.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-1492
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz
4
url VCID-m58x-8cam-3fdy
vulnerability_id VCID-m58x-8cam-3fdy
summary wireshark: Improper Handling of Missing Values in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-04T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39683
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-12T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39711
published_at 2026-04-08T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39725
published_at 2026-04-09T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39735
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39657
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20114
reference_id 20114
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20114
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
reference_id 2317746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-13.html
reference_id wnpa-sec-2024-13.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://www.wireshark.org/security/wnpa-sec-2024-13.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-9781
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy
5
url VCID-mb3r-da54-7kfk
vulnerability_id VCID-mb3r-da54-7kfk
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11057
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.1112
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10941
published_at 2026-04-07T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11019
published_at 2026-04-08T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11072
published_at 2026-04-09T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11076
published_at 2026-04-11T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11023
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
reference_id 2442639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-3203
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk
6
url VCID-mnuz-t2nj-nfh5
vulnerability_id VCID-mnuz-t2nj-nfh5
summary Wireshark: NULL Pointer Dereference in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9817
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10038
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10096
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10072
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10132
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10171
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10131
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10266
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9817
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20642
reference_id 20642
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20642
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392839
reference_id 2392839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392839
5
reference_url https://access.redhat.com/errata/RHSA-2026:1714
reference_id RHSA-2026:1714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1714
6
reference_url https://access.redhat.com/errata/RHSA-2026:2763
reference_id RHSA-2026:2763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2763
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-03.html
reference_id wnpa-sec-2025-03.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/
url https://www.wireshark.org/security/wnpa-sec-2025-03.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-9817
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5
7
url VCID-qs6k-my1v-8qh4
vulnerability_id VCID-qs6k-my1v-8qh4
summary wireshark: Access of Uninitialized Pointer in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-13T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05566
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.056
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20823
reference_id 20823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20823
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
reference_id 2416293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
6
reference_url https://access.redhat.com/errata/RHSA-2025:23083
reference_id RHSA-2025:23083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23083
7
reference_url https://access.redhat.com/errata/RHSA-2025:23142
reference_id RHSA-2025:23142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23142
8
reference_url https://access.redhat.com/errata/RHSA-2026:0432
reference_id RHSA-2026:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0432
9
reference_url https://access.redhat.com/errata/RHSA-2026:0433
reference_id RHSA-2026:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0433
10
reference_url https://access.redhat.com/errata/RHSA-2026:0452
reference_id RHSA-2026:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0452
11
reference_url https://access.redhat.com/errata/RHSA-2026:0454
reference_id RHSA-2026:0454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0454
12
reference_url https://access.redhat.com/errata/RHSA-2026:0483
reference_id RHSA-2026:0483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0483
13
reference_url https://www.wireshark.org/security/wnpa-sec-2025-06.html
reference_id wnpa-sec-2025-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://www.wireshark.org/security/wnpa-sec-2025-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13499
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4
8
url VCID-r54z-8gcg-pqg7
vulnerability_id VCID-r54z-8gcg-pqg7
summary wireshark: MONGO dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00858
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00848
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00846
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
reference_id 1117852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20724
reference_id 20724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20724
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
reference_id 2403225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-04.html
reference_id wnpa-sec-2025-04.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://www.wireshark.org/security/wnpa-sec-2025-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-11626
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7
9
url VCID-ra98-yk72-bkfq
vulnerability_id VCID-ra98-yk72-bkfq
summary wireshark: Buffer Overflow in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33964
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33857
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33924
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33922
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3388
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
reference_id 1107515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20509
reference_id 20509
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20509
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
reference_id 2370225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-02.html
reference_id wnpa-sec-2025-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://www.wireshark.org/security/wnpa-sec-2025-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-5601
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq
10
url VCID-shbm-pwte-rkgt
vulnerability_id VCID-shbm-pwte-rkgt
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06108
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06115
published_at 2026-04-12T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07571
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20214
reference_id 20214
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
reference_id 2327763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-15.html
reference_id wnpa-sec-2024-15.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://www.wireshark.org/security/wnpa-sec-2024-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-11596
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt
11
url VCID-wqn1-t4m4-wben
vulnerability_id VCID-wqn1-t4m4-wben
summary Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02731
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02725
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02775
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
reference_id 1125690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20944
reference_id 20944
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
reference_id 2429762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
7
reference_url https://www.wireshark.org/security/wnpa-sec-2026-04.html
reference_id wnpa-sec-2026-04.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://www.wireshark.org/security/wnpa-sec-2026-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-0960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben
Fixing_vulnerabilities
0
url VCID-114w-j43h-p3ek
vulnerability_id VCID-114w-j43h-p3ek
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07172
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20102
published_at 2026-04-13T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20179
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2016
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20318
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20860
reference_id 20860
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20860
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
reference_id 2418573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-07.html
reference_id wnpa-sec-2025-07.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://www.wireshark.org/security/wnpa-sec-2025-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13945
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek
1
url VCID-18xy-vuns-eqcx
vulnerability_id VCID-18xy-vuns-eqcx
summary wireshark: NFS dissector memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26205
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26041
published_at 2026-04-13T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26246
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26017
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26084
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26136
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26145
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.261
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18628
reference_id 18628
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18628
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
reference_id 2165846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
reference_id CVE-2023-0417.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-02.html
reference_id wnpa-sec-2023-02.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://www.wireshark.org/security/wnpa-sec-2023-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0417
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx
2
url VCID-1b6n-9bub-1ueu
vulnerability_id VCID-1b6n-9bub-1ueu
summary wireshark: DoS (crash) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12537
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12412
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12466
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12517
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1249
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12579
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19144
reference_id 19144
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19144
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
reference_id 2235813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-23.html
reference_id wnpa-sec-2023-23.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-23.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu
3
url VCID-1dz1-t49g-47bx
vulnerability_id VCID-1dz1-t49g-47bx
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0644
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06483
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06477
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0646
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
reference_id 2054047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0586
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx
4
url VCID-23d3-1z9s-r7ht
vulnerability_id VCID-23d3-1z9s-r7ht
summary wireshark: iSCSI dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37254
published_at 2026-04-02T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-13T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37281
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37162
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37176
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37186
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37152
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18796
reference_id 18796
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18796
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
reference_id 2165844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
reference_id CVE-2023-0415.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-05.html
reference_id wnpa-sec-2023-05.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://www.wireshark.org/security/wnpa-sec-2023-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0415
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht
5
url VCID-2bjq-y76h-qbhd
vulnerability_id VCID-2bjq-y76h-qbhd
summary wireshark: T.38 dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.2634
published_at 2026-04-13T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26318
published_at 2026-04-07T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26385
published_at 2026-04-08T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26436
published_at 2026-04-09T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26444
published_at 2026-04-11T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26398
published_at 2026-04-12T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26493
published_at 2026-04-02T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26537
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
reference_id 1068111
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19695
reference_id 19695
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19695
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
reference_id 2271741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-06.html
reference_id wnpa-sec-2024-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://www.wireshark.org/security/wnpa-sec-2024-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-2955
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd
6
url VCID-2pgm-khz1-auay
vulnerability_id VCID-2pgm-khz1-auay
summary wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12401
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12421
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12479
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20884
reference_id 20884
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
reference_id 2418572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-08.html
reference_id wnpa-sec-2025-08.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://www.wireshark.org/security/wnpa-sec-2025-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13946
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay
7
url VCID-436x-av41-43g4
vulnerability_id VCID-436x-av41-43g4
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15607
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1565
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15714
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15485
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15572
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15627
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15591
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15555
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.1549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
reference_id 2054049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0585
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4
8
url VCID-63pm-hact-8ybw
vulnerability_id VCID-63pm-hact-8ybw
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-13T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-11T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22511
published_at 2026-04-12T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-02T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2261
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-07T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22478
published_at 2026-04-08T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-09T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
reference_id 2054059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0581
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw
9
url VCID-6exv-jrtx-8yab
vulnerability_id VCID-6exv-jrtx-8yab
summary wireshark: GNW dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17966
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-13T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1772
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.1784
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18779
reference_id 18779
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18779
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
reference_id 2165845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
reference_id CVE-2023-0416.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
7
reference_url https://www.wireshark.org/security/wnpa-sec-2023-04.html
reference_id wnpa-sec-2023-04.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://www.wireshark.org/security/wnpa-sec-2023-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0416
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab
10
url VCID-7cgx-1cxn-7bdk
vulnerability_id VCID-7cgx-1cxn-7bdk
summary wireshark: Editcap secret injection crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4855
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06099
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06022
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06057
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06042
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19782
reference_id 19782
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19782
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19783
reference_id 19783
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19783
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19784
reference_id 19784
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19784
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280711
reference_id 2280711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280711
8
reference_url https://www.wireshark.org/security/wnpa-sec-2024-08.html
reference_id wnpa-sec-2024-08.html
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://www.wireshark.org/security/wnpa-sec-2024-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4855
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cgx-1cxn-7bdk
11
url VCID-9b6w-s1cn-57hz
vulnerability_id VCID-9b6w-s1cn-57hz
summary wireshark: dissection engine crash via conversation tracking module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-02T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34789
published_at 2026-04-13T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-04T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34774
published_at 2026-04-07T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34818
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-09T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34851
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34813
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18766
reference_id 18766
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18766
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
reference_id 2165842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
reference_id CVE-2023-0413.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-03.html
reference_id wnpa-sec-2023-03.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-03.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0413
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz
12
url VCID-a9rv-3ka3-67fr
vulnerability_id VCID-a9rv-3ka3-67fr
summary Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04174
published_at 2026-04-04T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04189
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05028
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05073
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05063
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05045
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19105
reference_id 19105
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19105
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-21.html
reference_id wnpa-sec-2023-21.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://www.wireshark.org/security/wnpa-sec-2023-21.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-3648
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr
13
url VCID-beux-z8f3-bbg4
vulnerability_id VCID-beux-z8f3-bbg4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13035
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-13T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13088
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12889
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12968
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13019
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19083
reference_id 19083
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19083
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
reference_id 2210824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
reference_id CVE-2023-2856.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-16.html
reference_id wnpa-sec-2023-16.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.wireshark.org/security/wnpa-sec-2023-16.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2856
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4
14
url VCID-ce6b-zqtu-jkdt
vulnerability_id VCID-ce6b-zqtu-jkdt
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20269
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20329
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20133
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20215
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
reference_id 2054056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0582
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt
15
url VCID-cvch-5rbz-gyah
vulnerability_id VCID-cvch-5rbz-gyah
summary wireshark: NetScreen File Parsing Heap-based Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13994
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13861
published_at 2026-04-13T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13852
published_at 2026-04-07T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13937
published_at 2026-04-08T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13989
published_at 2026-04-09T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13946
published_at 2026-04-11T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13909
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14049
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19404
reference_id 19404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19404
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
reference_id 2250151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-29.html
reference_id wnpa-sec-2023-29.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://www.wireshark.org/security/wnpa-sec-2023-29.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-6175
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah
16
url VCID-d1fd-fcrt-j7bj
vulnerability_id VCID-d1fd-fcrt-j7bj
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81894
published_at 2026-04-02T12:55:00Z
1
value 0.01852
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-13T12:55:00Z
2
value 0.01852
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-04T12:55:00Z
3
value 0.01852
scoring_system epss
scoring_elements 0.82966
published_at 2026-04-07T12:55:00Z
4
value 0.01852
scoring_system epss
scoring_elements 0.8299
published_at 2026-04-08T12:55:00Z
5
value 0.01852
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-09T12:55:00Z
6
value 0.01852
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-11T12:55:00Z
7
value 0.01852
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19085
reference_id 19085
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19085
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
reference_id 2210832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
6
reference_url https://takeonme.org/cves/CVE-2023-0666.html
reference_id CVE-2023-0666.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://takeonme.org/cves/CVE-2023-0666.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
11
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-18.html
reference_id wnpa-sec-2023-18.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/security/wnpa-sec-2023-18.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0666
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj
17
url VCID-d95z-wdv1-yye6
vulnerability_id VCID-d95z-wdv1-yye6
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42382
published_at 2026-04-02T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-13T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45714
published_at 2026-04-09T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45662
published_at 2026-04-07T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45718
published_at 2026-04-08T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45737
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45707
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19086
reference_id 19086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19086
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
reference_id 2229692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
6
reference_url https://takeonme.org/cves/CVE-2023-0667.html
reference_id CVE-2023-0667.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://takeonme.org/cves/CVE-2023-0667.html
7
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://security.gentoo.org/glsa/202309-02
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0667
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6
18
url VCID-dc45-d39b-u7bt
vulnerability_id VCID-dc45-d39b-u7bt
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
reference_id
reference_type
scores
0
value 0.00299
scoring_system epss
scoring_elements 0.53195
published_at 2026-04-02T12:55:00Z
1
value 0.00299
scoring_system epss
scoring_elements 0.53253
published_at 2026-04-13T12:55:00Z
2
value 0.00299
scoring_system epss
scoring_elements 0.53219
published_at 2026-04-04T12:55:00Z
3
value 0.00299
scoring_system epss
scoring_elements 0.53187
published_at 2026-04-07T12:55:00Z
4
value 0.00299
scoring_system epss
scoring_elements 0.5324
published_at 2026-04-08T12:55:00Z
5
value 0.00299
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-09T12:55:00Z
6
value 0.00299
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-11T12:55:00Z
7
value 0.00299
scoring_system epss
scoring_elements 0.5327
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18852
reference_id 18852
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18852
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
reference_id 2186329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
reference_id CVE-2023-1992.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-09.html
reference_id wnpa-sec-2023-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.wireshark.org/security/wnpa-sec-2023-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1992
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt
19
url VCID-dy74-uv3r-x7bs
vulnerability_id VCID-dy74-uv3r-x7bs
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41482
published_at 2026-04-12T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41467
published_at 2026-04-13T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41509
published_at 2026-04-04T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41435
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41485
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41494
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
reference_id 1033756
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18839
reference_id 18839
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18839
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
reference_id 2176452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
reference_id CVE-2023-1161.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://security.gentoo.org/glsa/202309-02
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-08.html
reference_id wnpa-sec-2023-08.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.wireshark.org/security/wnpa-sec-2023-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1161
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs
20
url VCID-eed3-ztv5-yqg9
vulnerability_id VCID-eed3-ztv5-yqg9
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50432
published_at 2026-04-02T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50461
published_at 2026-04-09T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50502
published_at 2026-04-11T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-08T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50414
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5048
published_at 2026-04-12T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18947
reference_id 18947
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18947
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
reference_id 2186325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
reference_id CVE-2023-1994.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-11.html
reference_id wnpa-sec-2023-11.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1994
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9
21
url VCID-end1-k29u-m7g8
vulnerability_id VCID-end1-k29u-m7g8
summary wireshark: NTLMSSP dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-07T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09174
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09204
published_at 2026-04-09T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-11T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09176
published_at 2026-04-12T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09117
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
reference_id 1080298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19943
reference_id 19943
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19943
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
reference_id 2308421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-11.html
reference_id wnpa-sec-2024-11.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://www.wireshark.org/security/wnpa-sec-2024-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-8250
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8
22
url VCID-eqkh-wnhk-5fdh
vulnerability_id VCID-eqkh-wnhk-5fdh
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32147
published_at 2026-04-01T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32279
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32141
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32218
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-12T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32149
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
reference_id 2039013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4186
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh
23
url VCID-fve5-m93p-vbf3
vulnerability_id VCID-fve5-m93p-vbf3
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
reference_id
reference_type
scores
0
value 0.00259
scoring_system epss
scoring_elements 0.49241
published_at 2026-04-02T12:55:00Z
1
value 0.00259
scoring_system epss
scoring_elements 0.49264
published_at 2026-04-12T12:55:00Z
2
value 0.00259
scoring_system epss
scoring_elements 0.49269
published_at 2026-04-13T12:55:00Z
3
value 0.00259
scoring_system epss
scoring_elements 0.49221
published_at 2026-04-07T12:55:00Z
4
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-08T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49272
published_at 2026-04-09T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.4929
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18900
reference_id 18900
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18900
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
reference_id 2186327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
reference_id CVE-2023-1993.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-10.html
reference_id wnpa-sec-2023-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.wireshark.org/security/wnpa-sec-2023-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1993
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3
24
url VCID-g38d-wdq8-sfgv
vulnerability_id VCID-g38d-wdq8-sfgv
summary wireshark: GVCP dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-13T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09794
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09867
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09919
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09926
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09889
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09846
published_at 2026-04-02T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09897
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19496
reference_id 19496
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19496
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
reference_id 2256659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-01.html
reference_id wnpa-sec-2024-01.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://www.wireshark.org/security/wnpa-sec-2024-01.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv
25
url VCID-h36t-f662-4ufw
vulnerability_id VCID-h36t-f662-4ufw
summary wireshark: Editcap byte chopping crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-13T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19082
published_at 2026-04-11T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19036
published_at 2026-04-12T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19503
published_at 2026-04-09T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19605
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19652
published_at 2026-04-04T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19373
published_at 2026-04-07T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19724
reference_id 19724
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19724
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
reference_id 2280718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-08.html
reference_id wnpa-sec-2024-08.html
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://www.wireshark.org/security/wnpa-sec-2024-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4853
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw
26
url VCID-h51a-cp8r-r3fx
vulnerability_id VCID-h51a-cp8r-r3fx
summary wireshark: TIPC dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-02T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-13T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43164
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43102
published_at 2026-04-07T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43155
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-09T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43189
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43156
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18770
reference_id 18770
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18770
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
reference_id 2165841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
reference_id CVE-2023-0412.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-07.html
reference_id wnpa-sec-2023-07.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://www.wireshark.org/security/wnpa-sec-2023-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0412
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx
27
url VCID-jka6-e5fr-rkcv
vulnerability_id VCID-jka6-e5fr-rkcv
summary wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26301
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-13T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26341
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26113
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.2618
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26228
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26236
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26191
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
reference_id 2160659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
reference_id CVE-2022-4345.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
6
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
9
reference_url https://www.wireshark.org/security/wnpa-sec-2022-09.html
reference_id wnpa-sec-2022-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://www.wireshark.org/security/wnpa-sec-2022-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-4345
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv
28
url VCID-jknb-n171-8udz
vulnerability_id VCID-jknb-n171-8udz
summary wireshark: possible Denial of Service via crafted package
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43749
published_at 2026-04-02T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43732
published_at 2026-04-13T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43774
published_at 2026-04-04T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43708
published_at 2026-04-07T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43758
published_at 2026-04-08T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43761
published_at 2026-04-09T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43781
published_at 2026-04-11T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43748
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19229
reference_id 19229
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19229
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
reference_id 2235363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
reference_id 6HCUPLDY7HLPO46PHMGIJSUBJFTT237C
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
7
reference_url https://takeonme.org/cves/CVE-2023-2906.html
reference_id CVE-2023-2906.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://takeonme.org/cves/CVE-2023-2906.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
reference_id L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
reference_id TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2906
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz
29
url VCID-k49z-j5v1-pkhf
vulnerability_id VCID-k49z-j5v1-pkhf
summary iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06464
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07504
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19164
reference_id 19164
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19164
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-22.html
reference_id wnpa-sec-2023-22.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://www.wireshark.org/security/wnpa-sec-2023-22.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-3649
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf
30
url VCID-k6r8-3ckd-87bf
vulnerability_id VCID-k6r8-3ckd-87bf
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08931
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08971
published_at 2026-04-13T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08981
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08911
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08989
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09021
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0902
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08983
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19100
reference_id 19100
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19100
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
reference_id 2211406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
reference_id CVE-2023-2952.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-20.html
reference_id wnpa-sec-2023-20.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.wireshark.org/security/wnpa-sec-2023-20.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2952
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf
31
url VCID-kpe5-12b6-pbes
vulnerability_id VCID-kpe5-12b6-pbes
summary wireshark: MONGO and ZigBee TLV dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71079
published_at 2026-04-13T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.7104
published_at 2026-04-02T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71058
published_at 2026-04-04T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71032
published_at 2026-04-07T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71075
published_at 2026-04-08T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71087
published_at 2026-04-09T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71111
published_at 2026-04-11T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
reference_id 15047
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
5
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
reference_id 15499
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19726
reference_id 19726
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19726
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
reference_id 2280715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
8
reference_url https://www.wireshark.org/security/wnpa-sec-2024-07.html
reference_id wnpa-sec-2024-07.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://www.wireshark.org/security/wnpa-sec-2024-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4854
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes
32
url VCID-ksm5-9amq-aqg1
vulnerability_id VCID-ksm5-9amq-aqg1
summary wireshark: DoS (memory leak) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05748
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05782
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05821
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05845
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05824
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
reference_id 2235814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4513
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1
33
url VCID-ktks-hvzs-c7ep
vulnerability_id VCID-ktks-hvzs-c7ep
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12846
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12898
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12703
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12834
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12763
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12716
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
reference_id 2039005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep
34
url VCID-ky3g-7wfh-v7fz
vulnerability_id VCID-ky3g-7wfh-v7fz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39516
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39455
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39525
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39536
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39498
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39481
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
reference_id 2039000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz
35
url VCID-m58x-8cam-3fdy
vulnerability_id VCID-m58x-8cam-3fdy
summary wireshark: Improper Handling of Missing Values in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-04T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39683
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-12T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39711
published_at 2026-04-08T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39725
published_at 2026-04-09T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39735
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39657
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20114
reference_id 20114
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20114
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
reference_id 2317746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-13.html
reference_id wnpa-sec-2024-13.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://www.wireshark.org/security/wnpa-sec-2024-13.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-9781
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy
36
url VCID-ne4k-vht4-rue7
vulnerability_id VCID-ne4k-vht4-rue7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23229
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23313
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23334
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23239
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
reference_id 2054051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0583
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7
37
url VCID-p3ew-pwr9-7yek
vulnerability_id VCID-p3ew-pwr9-7yek
summary wireshark: kafka dissector memory exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33339
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33479
published_at 2026-04-04T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-07T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33365
published_at 2026-04-08T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33399
published_at 2026-04-09T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33403
published_at 2026-04-11T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33361
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
reference_id 2160658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
reference_id CVE-2022-4344.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
8
reference_url https://www.wireshark.org/security/wnpa-sec-2022-10.html
reference_id wnpa-sec-2022-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://www.wireshark.org/security/wnpa-sec-2022-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-4344
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek
38
url VCID-prdk-zfnn-cyg3
vulnerability_id VCID-prdk-zfnn-cyg3
summary wireshark: f5ethtrailer Infinite loop in legacy style dissector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05321
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05371
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05384
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
reference_id 2152061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
5
reference_url https://access.redhat.com/errata/RHSA-2023:2373
reference_id RHSA-2023:2373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2373
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-3190
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3
39
url VCID-prz6-jk3b-wbhw
vulnerability_id VCID-prz6-jk3b-wbhw
summary wireshark: Multiple dissector excessive loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25256
published_at 2026-04-02T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25101
published_at 2026-04-13T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25294
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25067
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25137
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25182
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25197
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25154
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18711
reference_id 18711
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18711
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18720
reference_id 18720
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18720
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18737
reference_id 18737
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18737
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
reference_id 2165825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
8
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
reference_id CVE-2023-0411.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
9
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-06.html
reference_id wnpa-sec-2023-06.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://www.wireshark.org/security/wnpa-sec-2023-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0411
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw
40
url VCID-qs6k-my1v-8qh4
vulnerability_id VCID-qs6k-my1v-8qh4
summary wireshark: Access of Uninitialized Pointer in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-13T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05566
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.056
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20823
reference_id 20823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20823
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
reference_id 2416293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
6
reference_url https://access.redhat.com/errata/RHSA-2025:23083
reference_id RHSA-2025:23083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23083
7
reference_url https://access.redhat.com/errata/RHSA-2025:23142
reference_id RHSA-2025:23142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23142
8
reference_url https://access.redhat.com/errata/RHSA-2026:0432
reference_id RHSA-2026:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0432
9
reference_url https://access.redhat.com/errata/RHSA-2026:0433
reference_id RHSA-2026:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0433
10
reference_url https://access.redhat.com/errata/RHSA-2026:0452
reference_id RHSA-2026:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0452
11
reference_url https://access.redhat.com/errata/RHSA-2026:0454
reference_id RHSA-2026:0454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0454
12
reference_url https://access.redhat.com/errata/RHSA-2026:0483
reference_id RHSA-2026:0483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0483
13
reference_url https://www.wireshark.org/security/wnpa-sec-2025-06.html
reference_id wnpa-sec-2025-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://www.wireshark.org/security/wnpa-sec-2025-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13499
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4
41
url VCID-r54z-8gcg-pqg7
vulnerability_id VCID-r54z-8gcg-pqg7
summary wireshark: MONGO dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00858
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00848
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00846
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
reference_id 1117852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20724
reference_id 20724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20724
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
reference_id 2403225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-04.html
reference_id wnpa-sec-2025-04.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://www.wireshark.org/security/wnpa-sec-2025-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-11626
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7
42
url VCID-r9dr-xdt4-vke2
vulnerability_id VCID-r9dr-xdt4-vke2
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19062
reference_id 19062
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19062
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
reference_id 2210822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
reference_id CVE-2023-2855.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-12.html
reference_id wnpa-sec-2023-12.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.wireshark.org/security/wnpa-sec-2023-12.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2855
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2
43
url VCID-ra98-yk72-bkfq
vulnerability_id VCID-ra98-yk72-bkfq
summary wireshark: Buffer Overflow in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33964
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33857
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33924
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33922
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3388
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
reference_id 1107515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20509
reference_id 20509
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20509
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
reference_id 2370225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-02.html
reference_id wnpa-sec-2025-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://www.wireshark.org/security/wnpa-sec-2025-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-5601
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq
44
url VCID-s3e9-4cud-ufdn
vulnerability_id VCID-s3e9-4cud-ufdn
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31126
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31174
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31049
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31078
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31085
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31041
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
reference_id 2039029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4190
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn
45
url VCID-shbm-pwte-rkgt
vulnerability_id VCID-shbm-pwte-rkgt
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06108
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06115
published_at 2026-04-12T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07571
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20214
reference_id 20214
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
reference_id 2327763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-15.html
reference_id wnpa-sec-2024-15.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://www.wireshark.org/security/wnpa-sec-2024-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-11596
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt
46
url VCID-sj7t-z4pv-7ucz
vulnerability_id VCID-sj7t-z4pv-7ucz
summary wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12647
published_at 2026-04-13T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12633
published_at 2026-04-07T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12711
published_at 2026-04-08T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12764
published_at 2026-04-09T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12733
published_at 2026-04-11T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-12T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12783
published_at 2026-04-02T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1283
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19501
reference_id 19501
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19501
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
reference_id 2256656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-02.html
reference_id wnpa-sec-2024-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://www.wireshark.org/security/wnpa-sec-2024-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0209
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz
47
url VCID-t7vh-m6cf-rfef
vulnerability_id VCID-t7vh-m6cf-rfef
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-13T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29933
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29748
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2981
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29845
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29854
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19068
reference_id 19068
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19068
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
reference_id 2210466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
reference_id CVE-2023-2879.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-14.html
reference_id wnpa-sec-2023-14.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.wireshark.org/security/wnpa-sec-2023-14.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2879
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef
48
url VCID-tk9u-gtk1-v3hm
vulnerability_id VCID-tk9u-gtk1-v3hm
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32366
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32515
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3255
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32373
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32422
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32449
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32453
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32414
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32387
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
reference_id 2039011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm
49
url VCID-tvmn-b999-xya7
vulnerability_id VCID-tvmn-b999-xya7
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19081
reference_id 19081
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19081
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
reference_id 2210829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
reference_id CVE-2023-2858.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-15.html
reference_id wnpa-sec-2023-15.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.wireshark.org/security/wnpa-sec-2023-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2858
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7
50
url VCID-tyxd-yfmx-z7d7
vulnerability_id VCID-tyxd-yfmx-z7d7
summary SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23382
published_at 2026-04-13T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-07T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23406
published_at 2026-04-08T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23457
published_at 2026-04-09T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23476
published_at 2026-04-11T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-12T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.2355
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19559
reference_id 19559
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19559
4
reference_url https://www.wireshark.org/security/wnpa-sec-2024-10.html
reference_id wnpa-sec-2024-10.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://www.wireshark.org/security/wnpa-sec-2024-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-8645
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7
51
url VCID-u22d-aazu-6khn
vulnerability_id VCID-u22d-aazu-6khn
summary wireshark: DoS (infinite loop) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01362
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01367
published_at 2026-04-13T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01377
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01382
published_at 2026-04-09T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01371
published_at 2026-04-11T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01365
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
reference_id 2235812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4511
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn
52
url VCID-vbn8-ghgq-n7g1
vulnerability_id VCID-vbn8-ghgq-n7g1
summary wireshark: DOCSIS dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.2411
published_at 2026-04-13T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24079
published_at 2026-04-07T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24146
published_at 2026-04-08T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24191
published_at 2026-04-09T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24209
published_at 2026-04-11T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24167
published_at 2026-04-12T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2426
published_at 2026-04-02T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24294
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19557
reference_id 19557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19557
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
reference_id 2256652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-05.html
reference_id wnpa-sec-2024-05.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://www.wireshark.org/security/wnpa-sec-2024-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0211
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1
53
url VCID-whve-rre4-fbgr
vulnerability_id VCID-whve-rre4-fbgr
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53933
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5395
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53953
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54033
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
reference_id 2039009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr
54
url VCID-wqn1-t4m4-wben
vulnerability_id VCID-wqn1-t4m4-wben
summary Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02731
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02725
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02775
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
reference_id 1125690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20944
reference_id 20944
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
reference_id 2429762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
7
reference_url https://www.wireshark.org/security/wnpa-sec-2026-04.html
reference_id wnpa-sec-2026-04.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://www.wireshark.org/security/wnpa-sec-2026-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-0960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben
55
url VCID-ycu3-e7vh-2qc4
vulnerability_id VCID-ycu3-e7vh-2qc4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-02T12:55:00Z
1
value 0.01371
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-12T12:55:00Z
2
value 0.01371
scoring_system epss
scoring_elements 0.80194
published_at 2026-04-04T12:55:00Z
3
value 0.01371
scoring_system epss
scoring_elements 0.80183
published_at 2026-04-07T12:55:00Z
4
value 0.01371
scoring_system epss
scoring_elements 0.8021
published_at 2026-04-08T12:55:00Z
5
value 0.01371
scoring_system epss
scoring_elements 0.80219
published_at 2026-04-13T12:55:00Z
6
value 0.01371
scoring_system epss
scoring_elements 0.80238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19087
reference_id 19087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19087
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
reference_id 2210835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
6
reference_url https://takeonme.org/cves/CVE-2023-0668.html
reference_id CVE-2023-0668.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://takeonme.org/cves/CVE-2023-0668.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-19.html
reference_id wnpa-sec-2023-19.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-19.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0668
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1