Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1 |
| Type | deb |
| Namespace | debian |
| Name | wireshark |
| Version | 4.4.14-0+deb13u1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-114w-j43h-p3ek |
| vulnerability_id |
VCID-114w-j43h-p3ek |
| summary |
wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13945 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07172 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20102 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20041 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20122 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20179 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20205 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2016 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20318 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13945 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13945
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek |
|
| 1 |
| url |
VCID-2pgm-khz1-auay |
| vulnerability_id |
VCID-2pgm-khz1-auay |
| summary |
wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13946 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03871 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12401 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12341 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12472 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12479 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12441 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12533 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13946 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13946
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay |
|
| 2 |
| url |
VCID-9jam-asdr-cyec |
| vulnerability_id |
VCID-9jam-asdr-cyec |
| summary |
wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10281 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10178 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14636 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14619 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14676 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14598 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14537 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3201 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3201
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec |
|
| 3 |
| url |
VCID-kdgd-xdqb-9khz |
| vulnerability_id |
VCID-kdgd-xdqb-9khz |
| summary |
wireshark: Uncontrolled Recursion in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-1492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15595 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15662 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16099 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16224 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16167 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-1492 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-1492
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz |
|
| 4 |
| url |
VCID-m58x-8cam-3fdy |
| vulnerability_id |
VCID-m58x-8cam-3fdy |
| summary |
wireshark: Improper Handling of Missing Values in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39109 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00176 |
| scoring_system |
epss |
| scoring_elements |
0.39089 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39683 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39699 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39711 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39735 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0018 |
| scoring_system |
epss |
| scoring_elements |
0.39657 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9781 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-9781
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy |
|
| 5 |
| url |
VCID-mb3r-da54-7kfk |
| vulnerability_id |
VCID-mb3r-da54-7kfk |
| summary |
wireshark: Buffer Over-read in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11057 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1112 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10941 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11072 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11076 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11045 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11023 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3203
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk |
|
| 6 |
| url |
VCID-mnuz-t2nj-nfh5 |
| vulnerability_id |
VCID-mnuz-t2nj-nfh5 |
| summary |
Wireshark: NULL Pointer Dereference in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10038 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.1011 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10072 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10132 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10171 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10131 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10266 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9817 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9817
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5 |
|
| 7 |
| url |
VCID-qs6k-my1v-8qh4 |
| vulnerability_id |
VCID-qs6k-my1v-8qh4 |
| summary |
wireshark: Access of Uninitialized Pointer in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13499 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05532 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05583 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05604 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05629 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.056 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05568 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13499 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13499
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4 |
|
| 8 |
| url |
VCID-r54z-8gcg-pqg7 |
| vulnerability_id |
VCID-r54z-8gcg-pqg7 |
| summary |
wireshark: MONGO dissector infinite loop |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00848 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00865 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00863 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00859 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11626 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11626
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7 |
|
| 9 |
| url |
VCID-ra98-yk72-bkfq |
| vulnerability_id |
VCID-ra98-yk72-bkfq |
| summary |
wireshark: Buffer Overflow in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33857 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33995 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33922 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.3388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00141 |
| scoring_system |
epss |
| scoring_elements |
0.34358 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5601 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5601
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq |
|
| 10 |
| url |
VCID-shbm-pwte-rkgt |
| vulnerability_id |
VCID-shbm-pwte-rkgt |
| summary |
wireshark: Buffer Over-read in Wireshark |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11596 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06108 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06115 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07571 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07665 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07645 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07663 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07586 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11596 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-11596
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt |
|
| 11 |
| url |
VCID-wqn1-t4m4-wben |
| vulnerability_id |
VCID-wqn1-t4m4-wben |
| summary |
Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0960 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02725 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02746 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02756 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0273 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0960 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0960
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1 |