Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gedk-acar-m3g5
Summarywireshark: integer overflow in dissect_bgp_open() in epan/dissectors/packet-bgp.c
Aliases
0
alias CVE-2024-24478
Fixed_packages
0
url pkg:deb/debian/wireshark@0?distro=trixie
purl pkg:deb/debian/wireshark@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cgx-1cxn-7bdk
1
vulnerability VCID-mb3r-da54-7kfk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24478.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24478.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24478
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51177
published_at 2026-04-13T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51138
published_at 2026-04-02T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51161
published_at 2026-04-04T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51119
published_at 2026-04-07T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51174
published_at 2026-04-08T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.5117
published_at 2026-04-09T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51214
published_at 2026-04-11T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51192
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24478
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19347
reference_id 19347
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19347
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2265431
reference_id 2265431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2265431
5
reference_url https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef
reference_id 80a4dc55f4d2fa33c2b36a99406500726d3faaef
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/
url https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef
6
reference_url https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694
reference_id e82c55147cd3cb62ef20cbdb0ec83694
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-21T18:55:06Z/
url https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score7.5 - 7.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gedk-acar-m3g5