Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
Typedeb
Namespacedebian
Namewireshark
Version4.4.14-0+deb13u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-114w-j43h-p3ek
vulnerability_id VCID-114w-j43h-p3ek
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07172
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20102
published_at 2026-04-13T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20179
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2016
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20318
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20860
reference_id 20860
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20860
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
reference_id 2418573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-07.html
reference_id wnpa-sec-2025-07.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://www.wireshark.org/security/wnpa-sec-2025-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13945
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek
1
url VCID-2pgm-khz1-auay
vulnerability_id VCID-2pgm-khz1-auay
summary wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12401
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12421
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12479
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20884
reference_id 20884
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
reference_id 2418572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-08.html
reference_id wnpa-sec-2025-08.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://www.wireshark.org/security/wnpa-sec-2025-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13946
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay
2
url VCID-9jam-asdr-cyec
vulnerability_id VCID-9jam-asdr-cyec
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3201
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10216
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10281
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10178
published_at 2026-04-07T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14636
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14619
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14676
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14598
published_at 2026-04-12T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14537
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3201
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20972
reference_id 20972
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20972
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442641
reference_id 2442641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442641
5
reference_url https://www.wireshark.org/security/wnpa-sec-2026-05.html
reference_id wnpa-sec-2026-05.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/
url https://www.wireshark.org/security/wnpa-sec-2026-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-3201
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec
3
url VCID-kdgd-xdqb-9khz
vulnerability_id VCID-kdgd-xdqb-9khz
summary wireshark: Uncontrolled Recursion in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1492
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15595
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15662
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16099
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16075
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.1616
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16224
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16207
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16167
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1492
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20373
reference_id 20373
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20373
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2346737
reference_id 2346737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2346737
5
reference_url https://access.redhat.com/errata/RHSA-2025:9121
reference_id RHSA-2025:9121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9121
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-01.html
reference_id wnpa-sec-2025-01.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/
url https://www.wireshark.org/security/wnpa-sec-2025-01.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-1492
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz
4
url VCID-m58x-8cam-3fdy
vulnerability_id VCID-m58x-8cam-3fdy
summary wireshark: Improper Handling of Missing Values in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-04T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39683
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-12T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39711
published_at 2026-04-08T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39725
published_at 2026-04-09T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39735
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39657
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20114
reference_id 20114
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20114
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
reference_id 2317746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-13.html
reference_id wnpa-sec-2024-13.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://www.wireshark.org/security/wnpa-sec-2024-13.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-9781
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy
5
url VCID-mb3r-da54-7kfk
vulnerability_id VCID-mb3r-da54-7kfk
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11057
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.1112
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10941
published_at 2026-04-07T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11019
published_at 2026-04-08T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11072
published_at 2026-04-09T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11076
published_at 2026-04-11T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11023
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
reference_id 2442639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-3203
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk
6
url VCID-mnuz-t2nj-nfh5
vulnerability_id VCID-mnuz-t2nj-nfh5
summary Wireshark: NULL Pointer Dereference in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9817
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10038
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-13T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10096
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10072
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10132
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10171
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10131
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10266
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9817
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20642
reference_id 20642
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20642
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392839
reference_id 2392839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392839
5
reference_url https://access.redhat.com/errata/RHSA-2026:1714
reference_id RHSA-2026:1714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1714
6
reference_url https://access.redhat.com/errata/RHSA-2026:2763
reference_id RHSA-2026:2763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2763
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-03.html
reference_id wnpa-sec-2025-03.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/
url https://www.wireshark.org/security/wnpa-sec-2025-03.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-9817
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5
7
url VCID-qs6k-my1v-8qh4
vulnerability_id VCID-qs6k-my1v-8qh4
summary wireshark: Access of Uninitialized Pointer in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-13T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05566
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.056
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20823
reference_id 20823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20823
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
reference_id 2416293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
6
reference_url https://access.redhat.com/errata/RHSA-2025:23083
reference_id RHSA-2025:23083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23083
7
reference_url https://access.redhat.com/errata/RHSA-2025:23142
reference_id RHSA-2025:23142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23142
8
reference_url https://access.redhat.com/errata/RHSA-2026:0432
reference_id RHSA-2026:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0432
9
reference_url https://access.redhat.com/errata/RHSA-2026:0433
reference_id RHSA-2026:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0433
10
reference_url https://access.redhat.com/errata/RHSA-2026:0452
reference_id RHSA-2026:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0452
11
reference_url https://access.redhat.com/errata/RHSA-2026:0454
reference_id RHSA-2026:0454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0454
12
reference_url https://access.redhat.com/errata/RHSA-2026:0483
reference_id RHSA-2026:0483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0483
13
reference_url https://www.wireshark.org/security/wnpa-sec-2025-06.html
reference_id wnpa-sec-2025-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://www.wireshark.org/security/wnpa-sec-2025-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13499
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4
8
url VCID-r54z-8gcg-pqg7
vulnerability_id VCID-r54z-8gcg-pqg7
summary wireshark: MONGO dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00858
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00848
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00846
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
reference_id 1117852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20724
reference_id 20724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20724
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
reference_id 2403225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-04.html
reference_id wnpa-sec-2025-04.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://www.wireshark.org/security/wnpa-sec-2025-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-11626
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7
9
url VCID-ra98-yk72-bkfq
vulnerability_id VCID-ra98-yk72-bkfq
summary wireshark: Buffer Overflow in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33964
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33857
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33924
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33922
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3388
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
reference_id 1107515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20509
reference_id 20509
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20509
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
reference_id 2370225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-02.html
reference_id wnpa-sec-2025-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://www.wireshark.org/security/wnpa-sec-2025-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-5601
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq
10
url VCID-shbm-pwte-rkgt
vulnerability_id VCID-shbm-pwte-rkgt
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06108
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06115
published_at 2026-04-12T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07571
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20214
reference_id 20214
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
reference_id 2327763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-15.html
reference_id wnpa-sec-2024-15.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://www.wireshark.org/security/wnpa-sec-2024-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-11596
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt
11
url VCID-wqn1-t4m4-wben
vulnerability_id VCID-wqn1-t4m4-wben
summary Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02731
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02725
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02775
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
reference_id 1125690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20944
reference_id 20944
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
reference_id 2429762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
7
reference_url https://www.wireshark.org/security/wnpa-sec-2026-04.html
reference_id wnpa-sec-2026-04.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://www.wireshark.org/security/wnpa-sec-2026-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-0960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1