Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/994485?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "4.4.14-0+deb13u1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=api", "vulnerability_id": "VCID-114w-j43h-p3ek", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20102", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20205", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2016", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20318", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20860", "reference_id": "20860", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20860" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573", "reference_id": "2418573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418573" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html", "reference_id": "wnpa-sec-2025-07.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13945" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=api", "vulnerability_id": "VCID-2pgm-khz1-auay", "summary": "wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12479", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20884", "reference_id": "20884", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20884" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572", "reference_id": "2418572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418572" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html", "reference_id": "wnpa-sec-2025-08.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13946" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64426?format=api", "vulnerability_id": "VCID-9jam-asdr-cyec", "summary": "wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14676", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14537", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20972", "reference_id": "20972", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20972" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641", "reference_id": "2442641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442641" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html", "reference_id": "wnpa-sec-2026-05.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-3201" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71809?format=api", "vulnerability_id": "VCID-kdgd-xdqb-9khz", "summary": "wireshark: Uncontrolled Recursion in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16167", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1492" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20373", "reference_id": "20373", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20373" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737", "reference_id": "2346737", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9121", "reference_id": "RHSA-2025:9121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9121" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html", "reference_id": "wnpa-sec-2025-01.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-1492" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=api", "vulnerability_id": "VCID-m58x-8cam-3fdy", "summary": "wireshark: Improper Handling of Missing Values in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39657", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20114", "reference_id": "20114", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746", "reference_id": "2317746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317746" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html", "reference_id": "wnpa-sec-2024-13.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-9781" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64424?format=api", "vulnerability_id": "VCID-mb3r-da54-7kfk", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1112", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10941", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11076", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11023", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639", "reference_id": "2442639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442639" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-3203" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68195?format=api", "vulnerability_id": "VCID-mnuz-t2nj-nfh5", "summary": "Wireshark: NULL Pointer Dereference in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10266", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20642", "reference_id": "20642", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839", "reference_id": "2392839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392839" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1714", "reference_id": "RHSA-2026:1714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2763", "reference_id": "RHSA-2026:2763", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html", "reference_id": "wnpa-sec-2025-03.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-9817" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=api", "vulnerability_id": "VCID-qs6k-my1v-8qh4", "summary": "wireshark: Access of Uninitialized Pointer in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05532", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05583", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05566", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05568", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20823", "reference_id": "20823", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293", "reference_id": "2416293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23083", "reference_id": "RHSA-2025:23083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23142", "reference_id": "RHSA-2025:23142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0432", "reference_id": "RHSA-2026:0432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0433", "reference_id": "RHSA-2026:0433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0452", "reference_id": "RHSA-2026:0452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0454", "reference_id": "RHSA-2026:0454", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0454" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0483", "reference_id": "RHSA-2026:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0483" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html", "reference_id": "wnpa-sec-2025-06.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-13499" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=api", "vulnerability_id": "VCID-r54z-8gcg-pqg7", "summary": "wireshark: MONGO dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00865", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00859", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852", "reference_id": "1117852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20724", "reference_id": "20724", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20724" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225", "reference_id": "2403225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html", "reference_id": "wnpa-sec-2025-04.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-11626" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=api", "vulnerability_id": "VCID-ra98-yk72-bkfq", "summary": "wireshark: Buffer Overflow in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33892", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515", "reference_id": "1107515", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20509", "reference_id": "20509", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20509" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225", "reference_id": "2370225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370225" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html", "reference_id": "wnpa-sec-2025-02.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-5601" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=api", "vulnerability_id": "VCID-shbm-pwte-rkgt", "summary": "wireshark: Buffer Over-read in Wireshark", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07586", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20214", "reference_id": "20214", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20214" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763", "reference_id": "2327763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327763" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html", "reference_id": "wnpa-sec-2024-15.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2024-11596" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=api", "vulnerability_id": "VCID-wqn1-t4m4-wben", "summary": "Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02775", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0273", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-0960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690", "reference_id": "1125690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690" }, { "reference_url": "https://gitlab.com/wireshark/wireshark/-/issues/20944", "reference_id": "20944", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://gitlab.com/wireshark/wireshark/-/issues/20944" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762", "reference_id": "2429762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429762" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html", "reference_id": "wnpa-sec-2026-04.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/" } ], "url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994484?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994485?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-0960" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1" }