Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/994484?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "4.0.17-0+deb12u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.4.14-0+deb13u1", "latest_non_vulnerable_version": "4.4.14-0+deb13u1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=api", "vulnerability_id": "VCID-114w-j43h-p3ek", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20318", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20860", "reference_id": "20860", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20860" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573", "reference_id": "2418573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html", "reference_id": "wnpa-sec-2025-07.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13945" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=api", "vulnerability_id": "VCID-2pgm-khz1-auay", "summary": "wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20884", "reference_id": "20884", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20884" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572", "reference_id": "2418572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html", "reference_id": "wnpa-sec-2025-08.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13946" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64426?format=api", "vulnerability_id": "VCID-9jam-asdr-cyec", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14676", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14537", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20972", "reference_id": "20972", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20972" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641", "reference_id": "2442641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html", "reference_id": "wnpa-sec-2026-05.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-3201" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71809?format=api", "vulnerability_id": "VCID-kdgd-xdqb-9khz", "summary": "wireshark: Uncontrolled Recursion in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16167", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20373", "reference_id": "20373", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20373" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737", "reference_id": "2346737", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9121", "reference_id": "RHSA-2025:9121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9121" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html", "reference_id": "wnpa-sec-2025-01.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-1492" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=api", "vulnerability_id": "VCID-m58x-8cam-3fdy", "summary": "wireshark: Improper Handling of Missing Values in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39657", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20114", "reference_id": "20114", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746", "reference_id": "2317746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html", "reference_id": "wnpa-sec-2024-13.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-9781" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64424?format=api", "vulnerability_id": "VCID-mb3r-da54-7kfk", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1112", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10941", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11076", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11023", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639", "reference_id": "2442639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-3203" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68195?format=api", "vulnerability_id": "VCID-mnuz-t2nj-nfh5", "summary": "Wireshark: NULL Pointer Dereference in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10266", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20642", "reference_id": "20642", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839", "reference_id": "2392839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1714", "reference_id": "RHSA-2026:1714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2763", "reference_id": "RHSA-2026:2763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html", "reference_id": "wnpa-sec-2025-03.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-9817" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=api", "vulnerability_id": "VCID-qs6k-my1v-8qh4", "summary": "wireshark: Access of Uninitialized Pointer in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05583", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05568", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20823", "reference_id": "20823", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293", "reference_id": "2416293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23083", "reference_id": "RHSA-2025:23083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23142", "reference_id": "RHSA-2025:23142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0432", "reference_id": "RHSA-2026:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0433", "reference_id": "RHSA-2026:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0452", "reference_id": "RHSA-2026:0452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0454", "reference_id": "RHSA-2026:0454", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0483", "reference_id": "RHSA-2026:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0483" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html", "reference_id": "wnpa-sec-2025-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13499" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=api", "vulnerability_id": "VCID-r54z-8gcg-pqg7", "summary": "wireshark: MONGO dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00859", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852", "reference_id": "1117852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20724", "reference_id": "20724", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225", "reference_id": "2403225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html", "reference_id": "wnpa-sec-2025-04.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-11626" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=api", "vulnerability_id": "VCID-ra98-yk72-bkfq", "summary": "wireshark: Buffer Overflow in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515", "reference_id": "1107515", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20509", "reference_id": "20509", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20509" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225", "reference_id": "2370225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html", "reference_id": "wnpa-sec-2025-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-5601" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=api", "vulnerability_id": "VCID-shbm-pwte-rkgt", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07586", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20214", "reference_id": "20214", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763", "reference_id": "2327763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html", "reference_id": "wnpa-sec-2024-15.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-11596" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=api", "vulnerability_id": "VCID-wqn1-t4m4-wben", "summary": "Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0273", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20944", "reference_id": "20944", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20944" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762", "reference_id": "2429762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html", "reference_id": "wnpa-sec-2026-04.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-0960" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=api", "vulnerability_id": "VCID-114w-j43h-p3ek", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20318", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20860", "reference_id": "20860", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20860" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573", "reference_id": "2418573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html", "reference_id": "wnpa-sec-2025-07.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13945" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78708?format=api", "vulnerability_id": "VCID-18xy-vuns-eqcx", "summary": "wireshark: NFS dissector memory leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26041", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26136", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.261", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18628", "reference_id": "18628", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18628" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165846", "reference_id": "2165846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165846" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json", "reference_id": "CVE-2023-0417.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html", "reference_id": "wnpa-sec-2023-02.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0417" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78129?format=api", "vulnerability_id": "VCID-1b6n-9bub-1ueu", "summary": "wireshark: DoS (crash) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12537", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12412", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12466", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12579", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19144", "reference_id": "19144", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19144" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235813", "reference_id": "2235813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235813" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-23.html", "reference_id": "wnpa-sec-2023-23.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-23.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4512" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32115?format=api", "vulnerability_id": "VCID-1dz1-t49g-47bx", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06371", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06477", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0646", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054047", "reference_id": "2054047", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054047" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0586" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78706?format=api", "vulnerability_id": "VCID-23d3-1z9s-r7ht", "summary": "wireshark: iSCSI dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37125", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37186", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37152", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0415" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18796", "reference_id": "18796", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18796" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165844", "reference_id": "2165844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165844" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json", "reference_id": "CVE-2023-0415.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html", "reference_id": "wnpa-sec-2023-05.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0415" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77147?format=api", "vulnerability_id": "VCID-2bjq-y76h-qbhd", "summary": "wireshark: T.38 dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2955", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26444", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26398", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26537", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111", "reference_id": "1068111", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19695", "reference_id": "19695", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19695" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271741", "reference_id": "2271741", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271741" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html", "reference_id": "wnpa-sec-2024-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-2955" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=api", "vulnerability_id": "VCID-2pgm-khz1-auay", "summary": "wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20884", "reference_id": "20884", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20884" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572", "reference_id": "2418572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html", "reference_id": "wnpa-sec-2025-08.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13946" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32114?format=api", "vulnerability_id": "VCID-436x-av41-43g4", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1565", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15591", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15555", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1549", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054049", "reference_id": "2054049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054049" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0585" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32111?format=api", "vulnerability_id": "VCID-63pm-hact-8ybw", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22456", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22552", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22567", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22397", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22478", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22439", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054059", "reference_id": "2054059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054059" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0581" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78707?format=api", "vulnerability_id": "VCID-6exv-jrtx-8yab", "summary": "wireshark: GNW dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17884", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1784", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0416" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18779", "reference_id": "18779", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165845", "reference_id": "2165845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165845" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json", "reference_id": "CVE-2023-0416.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html", "reference_id": "wnpa-sec-2023-04.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0416" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76367?format=api", "vulnerability_id": "VCID-7cgx-1cxn-7bdk", "summary": "wireshark: Editcap secret injection crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06057", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06042", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06121", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06107", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19782", "reference_id": "19782", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19782" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19783", "reference_id": "19783", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19783" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19784", "reference_id": "19784", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19784" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280711", "reference_id": "2280711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280711" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html", "reference_id": "wnpa-sec-2024-08.html", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4855" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7cgx-1cxn-7bdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78704?format=api", "vulnerability_id": "VCID-9b6w-s1cn-57hz", "summary": "wireshark: dissection engine crash via conversation tracking module", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0413", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34818", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34851", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34813", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0413" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18766", "reference_id": "18766", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18766" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165842", "reference_id": "2165842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165842" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json", "reference_id": "CVE-2023-0413.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html", "reference_id": "wnpa-sec-2023-03.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0413" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95597?format=api", "vulnerability_id": "VCID-a9rv-3ka3-67fr", "summary": "Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04154", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04189", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05063", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05045", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101", "reference_id": "1041101", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19105", "reference_id": "19105", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19105" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-21.html", "reference_id": "wnpa-sec-2023-21.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-21.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-3648" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61361?format=api", "vulnerability_id": "VCID-beux-z8f3-bbg4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12968", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1298", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12943", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19083", "reference_id": "19083", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19083" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210824", "reference_id": "2210824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210824" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json", "reference_id": "CVE-2023-2856.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html", "reference_id": "wnpa-sec-2023-16.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2856" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32112?format=api", "vulnerability_id": "VCID-ce6b-zqtu-jkdt", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20215", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20112", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054056", "reference_id": "2054056", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054056" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0582" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77957?format=api", "vulnerability_id": "VCID-cvch-5rbz-gyah", "summary": "wireshark: NetScreen File Parsing Heap-based Buffer Overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13852", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13937", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13946", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13909", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14049", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19404", "reference_id": "19404", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19404" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250151", "reference_id": "2250151", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250151" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html", "reference_id": "wnpa-sec-2023-29.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-6175" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61352?format=api", "vulnerability_id": "VCID-d1fd-fcrt-j7bj", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01642", "scoring_system": "epss", "scoring_elements": "0.81894", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82969", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.8299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.82998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01852", "scoring_system": "epss", "scoring_elements": "0.83008", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19085", "reference_id": "19085", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19085" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210832", "reference_id": "2210832", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210832" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0666.html", "reference_id": "CVE-2023-0666.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0666.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "reference_id": "wireshark-4.0.6.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-18.html", "reference_id": "wnpa-sec-2023-18.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-18.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0666" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61353?format=api", "vulnerability_id": "VCID-d95z-wdv1-yye6", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45707", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19086", "reference_id": "19086", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19086" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229692", "reference_id": "2229692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229692" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0667.html", "reference_id": "CVE-2023-0667.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0667.html" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0667" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61356?format=api", "vulnerability_id": "VCID-dc45-d39b-u7bt", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1992", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53187", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53234", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5327", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18852", "reference_id": "18852", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18852" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186329", "reference_id": "2186329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186329" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json", "reference_id": "CVE-2023-1992.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html", "reference_id": "wnpa-sec-2023-09.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1992" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61355?format=api", "vulnerability_id": "VCID-dy74-uv3r-x7bs", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41509", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41514", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756", "reference_id": "1033756", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18839", "reference_id": "18839", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18839" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176452", "reference_id": "2176452", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176452" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json", "reference_id": "CVE-2023-1161.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html", "reference_id": "wnpa-sec-2023-08.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1161" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61358?format=api", "vulnerability_id": "VCID-eed3-ztv5-yqg9", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1994", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50461", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50502", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50468", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52092", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18947", "reference_id": "18947", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18947" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186325", "reference_id": "2186325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186325" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json", "reference_id": "CVE-2023-1994.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html", "reference_id": "wnpa-sec-2023-11.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1994" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74122?format=api", "vulnerability_id": "VCID-end1-k29u-m7g8", "summary": "wireshark: NTLMSSP dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8250", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09174", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09204", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0917", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298", "reference_id": "1080298", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19943", "reference_id": "19943", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19943" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308421", "reference_id": "2308421", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308421" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-11.html", "reference_id": "wnpa-sec-2024-11.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-11.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-8250" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32099?format=api", "vulnerability_id": "VCID-eqkh-wnhk-5fdh", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32147", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32218", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32181", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32149", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039013", "reference_id": "2039013", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039013" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4186" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61357?format=api", "vulnerability_id": "VCID-fve5-m93p-vbf3", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1993", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49241", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.4929", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721", "reference_id": "1034721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18900", "reference_id": "18900", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18900" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186327", "reference_id": "2186327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186327" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json", "reference_id": "CVE-2023-1993.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/", "reference_id": "EHLTD25WNQSPQNELX52UH6YLP4TBLKTT", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/", "reference_id": "FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/", "reference_id": "PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html", "reference_id": "wnpa-sec-2023-10.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-1993" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77873?format=api", "vulnerability_id": "VCID-g38d-wdq8-sfgv", "summary": "wireshark: GVCP dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09794", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09889", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09897", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19496", "reference_id": "19496", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19496" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256659", "reference_id": "2256659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256659" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html", "reference_id": "wnpa-sec-2024-01.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0208" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76368?format=api", "vulnerability_id": "VCID-h36t-f662-4ufw", "summary": "wireshark: Editcap byte chopping crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19605", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19652", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19451", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4853" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19724", "reference_id": "19724", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280718", "reference_id": "2280718", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280718" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html", "reference_id": "wnpa-sec-2024-08.html", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4853" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78703?format=api", "vulnerability_id": "VCID-h51a-cp8r-r3fx", "summary": "wireshark: TIPC dissector crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4314", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43155", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43189", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43156", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18770", "reference_id": "18770", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18770" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165841", "reference_id": "2165841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165841" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json", "reference_id": "CVE-2023-0412.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html", "reference_id": "wnpa-sec-2023-07.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0412" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78767?format=api", "vulnerability_id": "VCID-jka6-e5fr-rkcv", "summary": "wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26301", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26341", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26191", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160659", "reference_id": "2160659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160659" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json", "reference_id": "CVE-2022-4345.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/", "reference_id": "RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/", "reference_id": "SGWIW6K64PKC375YAONYXKIVT2FDEDV3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html", "reference_id": "wnpa-sec-2022-09.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-4345" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78126?format=api", "vulnerability_id": "VCID-jknb-n171-8udz", "summary": "wireshark: possible Denial of Service via crafted package", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43748", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19229", "reference_id": "19229", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19229" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235363", "reference_id": "2235363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235363" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/", "reference_id": "6HCUPLDY7HLPO46PHMGIJSUBJFTT237C", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-2906.html", "reference_id": "CVE-2023-2906.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-2906.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/", "reference_id": "L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/", "reference_id": "TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2906" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95598?format=api", "vulnerability_id": "VCID-k49z-j5v1-pkhf", "summary": "iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06453", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07505", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0749", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3649" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101", "reference_id": "1041101", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19164", "reference_id": "19164", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19164" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html", "reference_id": "wnpa-sec-2023-22.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-3649" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61365?format=api", "vulnerability_id": "VCID-k6r8-3ckd-87bf", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2952", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08931", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08971", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08981", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08983", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2952" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19100", "reference_id": "19100", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19100" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211406", "reference_id": "2211406", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211406" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json", "reference_id": "CVE-2023-2952.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html", "reference_id": "wnpa-sec-2023-20.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2952" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76354?format=api", "vulnerability_id": "VCID-kpe5-12b6-pbes", "summary": "wireshark: MONGO and ZigBee TLV dissector infinite loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4854", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71079", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.7104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71096", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15047", "reference_id": "15047", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15047" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15499", "reference_id": "15499", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/merge_requests/15499" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19726", "reference_id": "19726", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19726" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280715", "reference_id": "2280715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280715" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html", "reference_id": "wnpa-sec-2024-07.html", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-4854" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78130?format=api", "vulnerability_id": "VCID-ksm5-9amq-aqg1", "summary": "wireshark: DoS (memory leak) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05748", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00022", "scoring_system": "epss", "scoring_elements": "0.05809", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235814", "reference_id": "2235814", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235814" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4513" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32095?format=api", "vulnerability_id": "VCID-ktks-hvzs-c7ep", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12834", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12716", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039005", "reference_id": "2039005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039005" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4182" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32094?format=api", "vulnerability_id": "VCID-ky3g-7wfh-v7fz", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3951", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39525", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39536", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39481", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039000", "reference_id": "2039000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039000" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4181" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=api", "vulnerability_id": "VCID-m58x-8cam-3fdy", "summary": "wireshark: Improper Handling of Missing Values in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39657", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20114", "reference_id": "20114", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746", "reference_id": "2317746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html", "reference_id": "wnpa-sec-2024-13.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-9781" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32113?format=api", "vulnerability_id": "VCID-ne4k-vht4-rue7", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23229", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23263", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23334", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23239", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054051", "reference_id": "2054051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054051" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-0583" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78766?format=api", "vulnerability_id": "VCID-p3ew-pwr9-7yek", "summary": "wireshark: kafka dissector memory exhaustion.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33339", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33479", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33361", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160658", "reference_id": "2160658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160658" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json", "reference_id": "CVE-2022-4344.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/", "reference_id": "RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/", "reference_id": "SGWIW6K64PKC375YAONYXKIVT2FDEDV3", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html", "reference_id": "wnpa-sec-2022-10.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-4344" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79031?format=api", "vulnerability_id": "VCID-prdk-zfnn-cyg3", "summary": "wireshark: f5ethtrailer Infinite loop in legacy style dissector", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05384", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05376", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152061", "reference_id": "2152061", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2373", "reference_id": "RHSA-2023:2373", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2373" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2022-3190" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78702?format=api", "vulnerability_id": "VCID-prz6-jk3b-wbhw", "summary": "wireshark: Multiple dissector excessive loops", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0411", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25101", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25182", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25154", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18711", "reference_id": "18711", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18711" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18720", "reference_id": "18720", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18720" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/18737", "reference_id": "18737", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/18737" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165825", "reference_id": "2165825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165825" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json", "reference_id": "CVE-2023-0411.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html", "reference_id": "wnpa-sec-2023-06.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0411" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=api", "vulnerability_id": "VCID-qs6k-my1v-8qh4", "summary": "wireshark: Access of Uninitialized Pointer in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05583", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05568", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20823", "reference_id": "20823", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293", "reference_id": "2416293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23083", "reference_id": "RHSA-2025:23083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23142", "reference_id": "RHSA-2025:23142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0432", "reference_id": "RHSA-2026:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0433", "reference_id": "RHSA-2026:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0452", "reference_id": "RHSA-2026:0452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0454", "reference_id": "RHSA-2026:0454", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0483", "reference_id": "RHSA-2026:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0483" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html", "reference_id": "wnpa-sec-2025-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13499" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=api", "vulnerability_id": "VCID-r54z-8gcg-pqg7", "summary": "wireshark: MONGO dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00859", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852", "reference_id": "1117852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20724", "reference_id": "20724", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225", "reference_id": "2403225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html", "reference_id": "wnpa-sec-2025-04.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-11626" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61360?format=api", "vulnerability_id": "VCID-r9dr-xdt4-vke2", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18238", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18056", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19062", "reference_id": "19062", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19062" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210822", "reference_id": "2210822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210822" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json", "reference_id": "CVE-2023-2855.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html", "reference_id": "wnpa-sec-2023-12.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2855" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=api", "vulnerability_id": "VCID-ra98-yk72-bkfq", "summary": "wireshark: Buffer Overflow in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515", "reference_id": "1107515", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20509", "reference_id": "20509", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20509" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225", "reference_id": "2370225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html", "reference_id": "wnpa-sec-2025-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-5601" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32100?format=api", "vulnerability_id": "VCID-s3e9-4cud-ufdn", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31049", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31078", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31085", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30996", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039029", "reference_id": "2039029", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039029" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4190" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=api", "vulnerability_id": "VCID-shbm-pwte-rkgt", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07586", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20214", "reference_id": "20214", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763", "reference_id": "2327763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html", "reference_id": "wnpa-sec-2024-15.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-11596" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77872?format=api", "vulnerability_id": "VCID-sj7t-z4pv-7ucz", "summary": "wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12633", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12733", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1283", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19501", "reference_id": "19501", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19501" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256656", "reference_id": "2256656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256656" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html", "reference_id": "wnpa-sec-2024-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0209" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61364?format=api", "vulnerability_id": "VCID-t7vh-m6cf-rfef", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2879", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29808", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19068", "reference_id": "19068", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19068" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210466", "reference_id": "2210466", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210466" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json", "reference_id": "CVE-2023-2879.json", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html", "reference_id": "wnpa-sec-2023-14.html", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2879" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32098?format=api", "vulnerability_id": "VCID-tk9u-gtk1-v3hm", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32366", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32515", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3255", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32453", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32387", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039011", "reference_id": "2039011", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039011" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" }, { "reference_url": "https://usn.ubuntu.com/7552-1/", "reference_id": "USN-7552-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7552-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4185" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61363?format=api", "vulnerability_id": "VCID-tvmn-b999-xya7", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18007", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18238", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18086", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18056", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19081", "reference_id": "19081", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19081" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210829", "reference_id": "2210829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210829" }, { "reference_url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json", "reference_id": "CVE-2023-2858.json", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7015", "reference_id": "RHSA-2023:7015", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7015" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html", "reference_id": "wnpa-sec-2023-15.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-2858" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96386?format=api", "vulnerability_id": "VCID-tyxd-yfmx-z7d7", "summary": "SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23333", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2355", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19559", "reference_id": "19559", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19559" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html", "reference_id": "wnpa-sec-2024-10.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-8645" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78128?format=api", "vulnerability_id": "VCID-u22d-aazu-6khn", "summary": "wireshark: DoS (infinite loop) via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01367", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01365", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235812", "reference_id": "2235812", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235812" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-4511" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77870?format=api", "vulnerability_id": "VCID-vbn8-ghgq-n7g1", "summary": "wireshark: DOCSIS dissector crash via packet injection or crafted capture file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24079", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24146", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24294", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925", "reference_id": "1059925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19557", "reference_id": "19557", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19557" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256652", "reference_id": "2256652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256652" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html", "reference_id": "wnpa-sec-2024-05.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2024-0211" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32097?format=api", "vulnerability_id": "VCID-whve-rre4-fbgr", "summary": "Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.5395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54004", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54051", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54033", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54016", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039009", "reference_id": "2039009", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039009" }, { "reference_url": "https://security.gentoo.org/glsa/202210-04", "reference_id": "GLSA-202210-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2021-4184" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=api", "vulnerability_id": "VCID-wqn1-t4m4-wben", "summary": "Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0273", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20944", "reference_id": "20944", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20944" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762", "reference_id": "2429762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html", "reference_id": "wnpa-sec-2026-04.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-0960" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61354?format=api", "vulnerability_id": "VCID-ycu3-e7vh-2qc4", "summary": "Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01215", "scoring_system": "epss", "scoring_elements": "0.78979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.8021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01371", "scoring_system": "epss", "scoring_elements": "0.80238", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/19087", "reference_id": "19087", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/19087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210835", "reference_id": "2210835", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210835" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-0668.html", "reference_id": "CVE-2023-0668.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-0668.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5429", "reference_id": "dsa-5429", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5429" }, { "reference_url": "https://security.gentoo.org/glsa/202309-02", "reference_id": "GLSA-202309-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://security.gentoo.org/glsa/202309-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6469", "reference_id": "RHSA-2023:6469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6469" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html", "reference_id": "wireshark-4.0.6.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2023-19.html", "reference_id": "wnpa-sec-2023-19.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2023-19.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" } ], "aliases": [ "CVE-2023-0668" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4" } ], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }