Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/48999?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48999?format=api", "vulnerability_id": "VCID-k953-hk1g-z3hy", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "aliases": [ { "alias": "CVE-2013-3561" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942734?format=api", "purl": "pkg:deb/debian/wireshark@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-mb3r-da54-7kfk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/77709?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.1" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/123856?format=api", "purl": "pkg:rpm/redhat/wireshark@1.8.10-4?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ty4-6e2b-rkbs" }, { "vulnerability": "VCID-35kt-mmxz-xqag" }, { "vulnerability": "VCID-3dcx-c9yp-r7ae" }, { "vulnerability": "VCID-5t12-tvf4-a3dm" }, { "vulnerability": "VCID-6f2f-2esc-mke6" }, { "vulnerability": "VCID-7eac-g81q-w3fk" }, { "vulnerability": "VCID-7sz2-9v82-n3gg" }, { "vulnerability": "VCID-bjwk-j2vj-bqhz" }, { "vulnerability": "VCID-ef43-tgs4-1yh1" }, { "vulnerability": "VCID-eggc-7w1n-u7cb" }, { "vulnerability": "VCID-ezkv-2u84-5fcc" }, { "vulnerability": "VCID-f9h3-amnj-uqgf" }, { "vulnerability": "VCID-gtrt-c262-hffk" }, { "vulnerability": "VCID-k414-ufya-1yhp" }, { "vulnerability": "VCID-k7xv-4ugq-5qfz" }, { "vulnerability": "VCID-k953-hk1g-z3hy" }, { "vulnerability": "VCID-mqdg-6srp-huc4" }, { "vulnerability": "VCID-n8fe-ywyv-xyg6" }, { "vulnerability": "VCID-nam2-wj6p-87fq" }, { "vulnerability": "VCID-r1am-r2gp-3fhr" }, { "vulnerability": "VCID-r7hg-4pg7-tyfa" }, { "vulnerability": "VCID-rjy5-88kt-kuda" }, { "vulnerability": "VCID-sxdq-ncw8-b3fh" }, { "vulnerability": "VCID-thuh-cnf3-a3ab" }, { "vulnerability": "VCID-tzvw-ce84-xkbn" }, { "vulnerability": "VCID-uxfu-4j6w-qudu" }, { "vulnerability": "VCID-vbts-9zvs-d3fm" }, { "vulnerability": "VCID-vmt2-j84m-aqdd" }, { "vulnerability": "VCID-vsbh-31zu-f7b1" }, { "vulnerability": "VCID-x2qf-s1kg-33b9" }, { "vulnerability": "VCID-zszc-e2kn-3yhn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@1.8.10-4%3Farch=el6" } ], "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-etch.c?r1=48919&r2=48918&pathrev=48919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-etch.c?r1=48919&r2=48918&pathrev=48919" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mysql.c?r1=48894&r2=48893&pathrev=48894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mysql.c?r1=48894&r2=48893&pathrev=48894" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-websocket.c?r1=48336&r2=48335&pathrev=48336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-websocket.c?r1=48336&r2=48335&pathrev=48336" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48336" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48894" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48919", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48919" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3561.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3561.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81262", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81261", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3561" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8448" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8458" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8464" }, { "reference_url": "http://secunia.com/advisories/53425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53425" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16755" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-29.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-29.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-30.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-30.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-31.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-31.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=966331", "reference_id": "966331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=966331" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3561", "reference_id": "CVE-2013-3561", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3561" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" } ], "weaknesses": [ { "cwe_id": 189, "name": "Numeric Errors", "description": "Weaknesses in this category are related to improper calculation or conversion of numbers." } ], "exploits": [], "severity_range_score": "7.8 - 7.8", "exploitability": "0.5", "weighted_severity": "7.0", "risk_score": 3.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k953-hk1g-z3hy" }