Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
Typedeb
Namespacedebian
Namewireshark
Version3.4.10-0+deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.4.14-0+deb13u1
Latest_non_vulnerable_version4.4.14-0+deb13u1
Affected_by_vulnerabilities
0
url VCID-114w-j43h-p3ek
vulnerability_id VCID-114w-j43h-p3ek
summary wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07172
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20102
published_at 2026-04-13T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-07T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-08T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20179
published_at 2026-04-09T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20205
published_at 2026-04-11T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2016
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20318
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20860
reference_id 20860
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20860
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
reference_id 2418573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418573
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-07.html
reference_id wnpa-sec-2025-07.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/
url https://www.wireshark.org/security/wnpa-sec-2025-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13945
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek
1
url VCID-18xy-vuns-eqcx
vulnerability_id VCID-18xy-vuns-eqcx
summary wireshark: NFS dissector memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26205
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26041
published_at 2026-04-13T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26246
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26017
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26084
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26136
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26145
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.261
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18628
reference_id 18628
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18628
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
reference_id 2165846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165846
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
reference_id CVE-2023-0417.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-02.html
reference_id wnpa-sec-2023-02.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/
url https://www.wireshark.org/security/wnpa-sec-2023-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0417
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx
2
url VCID-1b6n-9bub-1ueu
vulnerability_id VCID-1b6n-9bub-1ueu
summary wireshark: DoS (crash) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12537
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12412
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12466
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12517
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1249
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12579
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19144
reference_id 19144
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19144
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
reference_id 2235813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235813
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-23.html
reference_id wnpa-sec-2023-23.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-23.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu
3
url VCID-1dz1-t49g-47bx
vulnerability_id VCID-1dz1-t49g-47bx
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06354
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06371
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.0644
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06483
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06477
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06471
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0646
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
reference_id 2054047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054047
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0586
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx
4
url VCID-23d3-1z9s-r7ht
vulnerability_id VCID-23d3-1z9s-r7ht
summary wireshark: iSCSI dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37254
published_at 2026-04-02T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-13T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37281
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37162
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37176
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37186
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37152
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0415
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18796
reference_id 18796
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18796
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
reference_id 2165844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165844
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
reference_id CVE-2023-0415.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-05.html
reference_id wnpa-sec-2023-05.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/
url https://www.wireshark.org/security/wnpa-sec-2023-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0415
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht
5
url VCID-2bjq-y76h-qbhd
vulnerability_id VCID-2bjq-y76h-qbhd
summary wireshark: T.38 dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.2634
published_at 2026-04-13T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26318
published_at 2026-04-07T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26385
published_at 2026-04-08T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26436
published_at 2026-04-09T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26444
published_at 2026-04-11T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26398
published_at 2026-04-12T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26493
published_at 2026-04-02T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26537
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
reference_id 1068111
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19695
reference_id 19695
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19695
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
reference_id 2271741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271741
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-06.html
reference_id wnpa-sec-2024-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/
url https://www.wireshark.org/security/wnpa-sec-2024-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-2955
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd
6
url VCID-2pgm-khz1-auay
vulnerability_id VCID-2pgm-khz1-auay
summary wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12401
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-07T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12421
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12479
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20884
reference_id 20884
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
reference_id 2418572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418572
6
reference_url https://www.wireshark.org/security/wnpa-sec-2025-08.html
reference_id wnpa-sec-2025-08.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/
url https://www.wireshark.org/security/wnpa-sec-2025-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13946
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay
7
url VCID-436x-av41-43g4
vulnerability_id VCID-436x-av41-43g4
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15607
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1565
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15714
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15485
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15572
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15627
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15591
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15555
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.1549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
reference_id 2054049
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054049
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0585
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4
8
url VCID-63pm-hact-8ybw
vulnerability_id VCID-63pm-hact-8ybw
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22456
published_at 2026-04-13T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-11T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22511
published_at 2026-04-12T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-02T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2261
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-07T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22478
published_at 2026-04-08T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-09T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22439
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
reference_id 2054059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054059
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0581
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw
9
url VCID-6exv-jrtx-8yab
vulnerability_id VCID-6exv-jrtx-8yab
summary wireshark: GNW dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17966
published_at 2026-04-02T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-13T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.1772
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17807
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17868
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.1784
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0416
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18779
reference_id 18779
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18779
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
reference_id 2165845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165845
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
reference_id CVE-2023-0416.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
7
reference_url https://www.wireshark.org/security/wnpa-sec-2023-04.html
reference_id wnpa-sec-2023-04.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/
url https://www.wireshark.org/security/wnpa-sec-2023-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0416
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab
10
url VCID-7cgx-1cxn-7bdk
vulnerability_id VCID-7cgx-1cxn-7bdk
summary wireshark: Editcap secret injection crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4855
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06099
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06022
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06057
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06042
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06121
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06112
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06107
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19782
reference_id 19782
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19782
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19783
reference_id 19783
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19783
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19784
reference_id 19784
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19784
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280711
reference_id 2280711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280711
8
reference_url https://www.wireshark.org/security/wnpa-sec-2024-08.html
reference_id wnpa-sec-2024-08.html
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/
url https://www.wireshark.org/security/wnpa-sec-2024-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4855
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cgx-1cxn-7bdk
11
url VCID-9b6w-s1cn-57hz
vulnerability_id VCID-9b6w-s1cn-57hz
summary wireshark: dissection engine crash via conversation tracking module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-02T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34789
published_at 2026-04-13T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-04T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34774
published_at 2026-04-07T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34818
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-09T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34851
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34813
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18766
reference_id 18766
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18766
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
reference_id 2165842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165842
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
reference_id CVE-2023-0413.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-03.html
reference_id wnpa-sec-2023-03.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-03.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0413
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz
12
url VCID-a9rv-3ka3-67fr
vulnerability_id VCID-a9rv-3ka3-67fr
summary Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04174
published_at 2026-04-04T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04154
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04189
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05028
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05073
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05063
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05045
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3648
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19105
reference_id 19105
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19105
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-21.html
reference_id wnpa-sec-2023-21.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/
url https://www.wireshark.org/security/wnpa-sec-2023-21.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-3648
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr
13
url VCID-beux-z8f3-bbg4
vulnerability_id VCID-beux-z8f3-bbg4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13035
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-13T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13088
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12889
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12968
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13019
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1298
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19083
reference_id 19083
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19083
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
reference_id 2210824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210824
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
reference_id CVE-2023-2856.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-16.html
reference_id wnpa-sec-2023-16.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/
url https://www.wireshark.org/security/wnpa-sec-2023-16.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2856
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4
14
url VCID-ce6b-zqtu-jkdt
vulnerability_id VCID-ce6b-zqtu-jkdt
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20158
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20269
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20329
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20133
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20215
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20112
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
reference_id 2054056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054056
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0582
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt
15
url VCID-cvch-5rbz-gyah
vulnerability_id VCID-cvch-5rbz-gyah
summary wireshark: NetScreen File Parsing Heap-based Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13994
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13861
published_at 2026-04-13T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13852
published_at 2026-04-07T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13937
published_at 2026-04-08T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13989
published_at 2026-04-09T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13946
published_at 2026-04-11T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13909
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14049
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19404
reference_id 19404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19404
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
reference_id 2250151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2250151
6
reference_url https://www.wireshark.org/security/wnpa-sec-2023-29.html
reference_id wnpa-sec-2023-29.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/
url https://www.wireshark.org/security/wnpa-sec-2023-29.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-6175
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah
16
url VCID-d1fd-fcrt-j7bj
vulnerability_id VCID-d1fd-fcrt-j7bj
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
reference_id
reference_type
scores
0
value 0.01642
scoring_system epss
scoring_elements 0.81894
published_at 2026-04-02T12:55:00Z
1
value 0.01852
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-13T12:55:00Z
2
value 0.01852
scoring_system epss
scoring_elements 0.82969
published_at 2026-04-04T12:55:00Z
3
value 0.01852
scoring_system epss
scoring_elements 0.82966
published_at 2026-04-07T12:55:00Z
4
value 0.01852
scoring_system epss
scoring_elements 0.8299
published_at 2026-04-08T12:55:00Z
5
value 0.01852
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-09T12:55:00Z
6
value 0.01852
scoring_system epss
scoring_elements 0.83014
published_at 2026-04-11T12:55:00Z
7
value 0.01852
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19085
reference_id 19085
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19085
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
reference_id 2210832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210832
6
reference_url https://takeonme.org/cves/CVE-2023-0666.html
reference_id CVE-2023-0666.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://takeonme.org/cves/CVE-2023-0666.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
11
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-18.html
reference_id wnpa-sec-2023-18.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/
url https://www.wireshark.org/security/wnpa-sec-2023-18.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0666
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj
17
url VCID-d95z-wdv1-yye6
vulnerability_id VCID-d95z-wdv1-yye6
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42382
published_at 2026-04-02T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45715
published_at 2026-04-13T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45714
published_at 2026-04-09T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45662
published_at 2026-04-07T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45718
published_at 2026-04-08T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45737
published_at 2026-04-11T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45707
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19086
reference_id 19086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19086
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
reference_id 2229692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2229692
6
reference_url https://takeonme.org/cves/CVE-2023-0667.html
reference_id CVE-2023-0667.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://takeonme.org/cves/CVE-2023-0667.html
7
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/
url https://security.gentoo.org/glsa/202309-02
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0667
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6
18
url VCID-dc45-d39b-u7bt
vulnerability_id VCID-dc45-d39b-u7bt
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
reference_id
reference_type
scores
0
value 0.00299
scoring_system epss
scoring_elements 0.53195
published_at 2026-04-02T12:55:00Z
1
value 0.00299
scoring_system epss
scoring_elements 0.53253
published_at 2026-04-13T12:55:00Z
2
value 0.00299
scoring_system epss
scoring_elements 0.53219
published_at 2026-04-04T12:55:00Z
3
value 0.00299
scoring_system epss
scoring_elements 0.53187
published_at 2026-04-07T12:55:00Z
4
value 0.00299
scoring_system epss
scoring_elements 0.5324
published_at 2026-04-08T12:55:00Z
5
value 0.00299
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-09T12:55:00Z
6
value 0.00299
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-11T12:55:00Z
7
value 0.00299
scoring_system epss
scoring_elements 0.5327
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1992
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18852
reference_id 18852
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18852
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
reference_id 2186329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186329
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
reference_id CVE-2023-1992.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-09.html
reference_id wnpa-sec-2023-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/
url https://www.wireshark.org/security/wnpa-sec-2023-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1992
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt
19
url VCID-dy74-uv3r-x7bs
vulnerability_id VCID-dy74-uv3r-x7bs
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41482
published_at 2026-04-12T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41467
published_at 2026-04-13T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41509
published_at 2026-04-04T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41435
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41485
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41494
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
reference_id 1033756
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18839
reference_id 18839
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18839
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
reference_id 2176452
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176452
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
reference_id CVE-2023-1161.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://security.gentoo.org/glsa/202309-02
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-08.html
reference_id wnpa-sec-2023-08.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/
url https://www.wireshark.org/security/wnpa-sec-2023-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1161
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs
20
url VCID-eed3-ztv5-yqg9
vulnerability_id VCID-eed3-ztv5-yqg9
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50432
published_at 2026-04-02T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.50461
published_at 2026-04-09T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50502
published_at 2026-04-11T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-08T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50414
published_at 2026-04-07T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.5048
published_at 2026-04-12T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1994
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18947
reference_id 18947
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18947
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
reference_id 2186325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186325
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
reference_id CVE-2023-1994.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-11.html
reference_id wnpa-sec-2023-11.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/
url https://www.wireshark.org/security/wnpa-sec-2023-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1994
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9
21
url VCID-end1-k29u-m7g8
vulnerability_id VCID-end1-k29u-m7g8
summary wireshark: NTLMSSP dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-07T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09174
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09204
published_at 2026-04-09T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-11T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09176
published_at 2026-04-12T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09117
published_at 2026-04-02T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0917
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8250
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
reference_id 1080298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19943
reference_id 19943
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19943
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
reference_id 2308421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308421
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-11.html
reference_id wnpa-sec-2024-11.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/
url https://www.wireshark.org/security/wnpa-sec-2024-11.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-8250
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8
22
url VCID-eqkh-wnhk-5fdh
vulnerability_id VCID-eqkh-wnhk-5fdh
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32147
published_at 2026-04-01T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32279
published_at 2026-04-02T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32317
published_at 2026-04-04T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32141
published_at 2026-04-07T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32191
published_at 2026-04-08T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32218
published_at 2026-04-09T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.3222
published_at 2026-04-11T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-12T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32149
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
reference_id 2039013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039013
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4186
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh
23
url VCID-fve5-m93p-vbf3
vulnerability_id VCID-fve5-m93p-vbf3
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
reference_id
reference_type
scores
0
value 0.00259
scoring_system epss
scoring_elements 0.49241
published_at 2026-04-02T12:55:00Z
1
value 0.00259
scoring_system epss
scoring_elements 0.49264
published_at 2026-04-12T12:55:00Z
2
value 0.00259
scoring_system epss
scoring_elements 0.49269
published_at 2026-04-13T12:55:00Z
3
value 0.00259
scoring_system epss
scoring_elements 0.49221
published_at 2026-04-07T12:55:00Z
4
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-08T12:55:00Z
5
value 0.00259
scoring_system epss
scoring_elements 0.49272
published_at 2026-04-09T12:55:00Z
6
value 0.00259
scoring_system epss
scoring_elements 0.4929
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
reference_id 1034721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18900
reference_id 18900
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18900
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
reference_id 2186327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186327
7
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
reference_id CVE-2023-1993.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
8
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.debian.org/security/2023/dsa-5429
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
reference_id EHLTD25WNQSPQNELX52UH6YLP4TBLKTT
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
reference_id FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/
11
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://security.gentoo.org/glsa/202309-02
12
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
reference_id PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/
14
reference_url https://www.wireshark.org/security/wnpa-sec-2023-10.html
reference_id wnpa-sec-2023-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/
url https://www.wireshark.org/security/wnpa-sec-2023-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-1993
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3
24
url VCID-g38d-wdq8-sfgv
vulnerability_id VCID-g38d-wdq8-sfgv
summary wireshark: GVCP dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-13T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09794
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09867
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09919
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09926
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09889
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09846
published_at 2026-04-02T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09897
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19496
reference_id 19496
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19496
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
reference_id 2256659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256659
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-01.html
reference_id wnpa-sec-2024-01.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/
url https://www.wireshark.org/security/wnpa-sec-2024-01.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv
25
url VCID-h36t-f662-4ufw
vulnerability_id VCID-h36t-f662-4ufw
summary wireshark: Editcap byte chopping crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-13T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19082
published_at 2026-04-11T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19036
published_at 2026-04-12T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19503
published_at 2026-04-09T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19605
published_at 2026-04-02T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19652
published_at 2026-04-04T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19373
published_at 2026-04-07T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19724
reference_id 19724
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19724
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
reference_id 2280718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280718
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-08.html
reference_id wnpa-sec-2024-08.html
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/
url https://www.wireshark.org/security/wnpa-sec-2024-08.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4853
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw
26
url VCID-h51a-cp8r-r3fx
vulnerability_id VCID-h51a-cp8r-r3fx
summary wireshark: TIPC dissector crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43137
published_at 2026-04-02T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.4314
published_at 2026-04-13T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43164
published_at 2026-04-04T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43102
published_at 2026-04-07T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43155
published_at 2026-04-08T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-09T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43189
published_at 2026-04-11T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43156
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18770
reference_id 18770
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18770
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
reference_id 2165841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165841
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
reference_id CVE-2023-0412.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
7
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2023-07.html
reference_id wnpa-sec-2023-07.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/
url https://www.wireshark.org/security/wnpa-sec-2023-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0412
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx
27
url VCID-jka6-e5fr-rkcv
vulnerability_id VCID-jka6-e5fr-rkcv
summary wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26301
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-13T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26341
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26113
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.2618
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26228
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26236
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26191
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
reference_id 2160659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160659
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
reference_id CVE-2022-4345.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
6
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
9
reference_url https://www.wireshark.org/security/wnpa-sec-2022-09.html
reference_id wnpa-sec-2022-09.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/
url https://www.wireshark.org/security/wnpa-sec-2022-09.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-4345
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv
28
url VCID-jknb-n171-8udz
vulnerability_id VCID-jknb-n171-8udz
summary wireshark: possible Denial of Service via crafted package
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43749
published_at 2026-04-02T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43732
published_at 2026-04-13T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43774
published_at 2026-04-04T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43708
published_at 2026-04-07T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43758
published_at 2026-04-08T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43761
published_at 2026-04-09T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43781
published_at 2026-04-11T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43748
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2906
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19229
reference_id 19229
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19229
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
reference_id 2235363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235363
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
reference_id 6HCUPLDY7HLPO46PHMGIJSUBJFTT237C
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
7
reference_url https://takeonme.org/cves/CVE-2023-2906.html
reference_id CVE-2023-2906.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://takeonme.org/cves/CVE-2023-2906.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
reference_id L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
reference_id TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2906
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz
29
url VCID-k49z-j5v1-pkhf
vulnerability_id VCID-k49z-j5v1-pkhf
summary iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06464
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06453
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07482
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07504
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3649
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
reference_id 1041101
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19164
reference_id 19164
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19164
5
reference_url https://www.wireshark.org/security/wnpa-sec-2023-22.html
reference_id wnpa-sec-2023-22.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/
url https://www.wireshark.org/security/wnpa-sec-2023-22.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-3649
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf
30
url VCID-k6r8-3ckd-87bf
vulnerability_id VCID-k6r8-3ckd-87bf
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08931
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08971
published_at 2026-04-13T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08981
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08911
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08989
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09021
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0902
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08983
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19100
reference_id 19100
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19100
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
reference_id 2211406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211406
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
reference_id CVE-2023-2952.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-20.html
reference_id wnpa-sec-2023-20.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/
url https://www.wireshark.org/security/wnpa-sec-2023-20.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2952
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf
31
url VCID-kpe5-12b6-pbes
vulnerability_id VCID-kpe5-12b6-pbes
summary wireshark: MONGO and ZigBee TLV dissector infinite loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71079
published_at 2026-04-13T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.7104
published_at 2026-04-02T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71058
published_at 2026-04-04T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71032
published_at 2026-04-07T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71075
published_at 2026-04-08T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71087
published_at 2026-04-09T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71111
published_at 2026-04-11T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
reference_id 15047
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15047
5
reference_url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
reference_id 15499
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/merge_requests/15499
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19726
reference_id 19726
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19726
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
reference_id 2280715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2280715
8
reference_url https://www.wireshark.org/security/wnpa-sec-2024-07.html
reference_id wnpa-sec-2024-07.html
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/
url https://www.wireshark.org/security/wnpa-sec-2024-07.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-4854
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes
32
url VCID-ksm5-9amq-aqg1
vulnerability_id VCID-ksm5-9amq-aqg1
summary wireshark: DoS (memory leak) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05748
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05787
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05782
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05821
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05845
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05824
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
reference_id 2235814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235814
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4513
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1
33
url VCID-ktks-hvzs-c7ep
vulnerability_id VCID-ktks-hvzs-c7ep
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12745
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12846
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12898
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12703
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12782
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12834
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.128
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12763
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12716
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
reference_id 2039005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039005
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4182
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep
34
url VCID-ky3g-7wfh-v7fz
vulnerability_id VCID-ky3g-7wfh-v7fz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39516
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39455
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.3951
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39525
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39536
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39498
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39481
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
reference_id 2039000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039000
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz
35
url VCID-m58x-8cam-3fdy
vulnerability_id VCID-m58x-8cam-3fdy
summary wireshark: Improper Handling of Missing Values in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39109
published_at 2026-04-04T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39089
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39683
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39699
published_at 2026-04-12T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39711
published_at 2026-04-08T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39725
published_at 2026-04-09T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39735
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39657
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20114
reference_id 20114
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20114
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
reference_id 2317746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317746
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-13.html
reference_id wnpa-sec-2024-13.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/
url https://www.wireshark.org/security/wnpa-sec-2024-13.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-9781
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy
36
url VCID-mb3r-da54-7kfk
vulnerability_id VCID-mb3r-da54-7kfk
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11057
published_at 2026-04-02T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.1112
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10941
published_at 2026-04-07T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11019
published_at 2026-04-08T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11072
published_at 2026-04-09T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11076
published_at 2026-04-11T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11023
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
reference_id 2442639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442639
fixed_packages
0
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-3203
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk
37
url VCID-ne4k-vht4-rue7
vulnerability_id VCID-ne4k-vht4-rue7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23229
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23362
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23313
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23334
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23239
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
reference_id 2054051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2054051
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-0583
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7
38
url VCID-p3ew-pwr9-7yek
vulnerability_id VCID-p3ew-pwr9-7yek
summary wireshark: kafka dissector memory exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33339
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33479
published_at 2026-04-04T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-07T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33365
published_at 2026-04-08T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33399
published_at 2026-04-09T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33403
published_at 2026-04-11T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33361
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
reference_id 2160658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160658
5
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
reference_id CVE-2022-4344.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
reference_id RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
reference_id SGWIW6K64PKC375YAONYXKIVT2FDEDV3
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/
8
reference_url https://www.wireshark.org/security/wnpa-sec-2022-10.html
reference_id wnpa-sec-2022-10.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/
url https://www.wireshark.org/security/wnpa-sec-2022-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-4344
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek
39
url VCID-prdk-zfnn-cyg3
vulnerability_id VCID-prdk-zfnn-cyg3
summary wireshark: f5ethtrailer Infinite loop in legacy style dissector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05321
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05353
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05371
published_at 2026-04-07T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05405
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05428
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-11T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05384
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05376
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
reference_id 2152061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152061
5
reference_url https://access.redhat.com/errata/RHSA-2023:2373
reference_id RHSA-2023:2373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2373
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2022-3190
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3
40
url VCID-prz6-jk3b-wbhw
vulnerability_id VCID-prz6-jk3b-wbhw
summary wireshark: Multiple dissector excessive loops
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25256
published_at 2026-04-02T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25101
published_at 2026-04-13T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25294
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25067
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25137
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25182
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25197
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25154
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0411
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18711
reference_id 18711
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18711
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18720
reference_id 18720
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18720
6
reference_url https://gitlab.com/wireshark/wireshark/-/issues/18737
reference_id 18737
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/wireshark/wireshark/-/issues/18737
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
reference_id 2165825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165825
8
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
reference_id CVE-2023-0411.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
9
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-06.html
reference_id wnpa-sec-2023-06.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/
url https://www.wireshark.org/security/wnpa-sec-2023-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0411
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw
41
url VCID-qs6k-my1v-8qh4
vulnerability_id VCID-qs6k-my1v-8qh4
summary wireshark: Access of Uninitialized Pointer in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05583
published_at 2026-04-13T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05566
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.056
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.0559
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05568
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20823
reference_id 20823
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20823
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
reference_id 2416293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416293
6
reference_url https://access.redhat.com/errata/RHSA-2025:23083
reference_id RHSA-2025:23083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23083
7
reference_url https://access.redhat.com/errata/RHSA-2025:23142
reference_id RHSA-2025:23142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23142
8
reference_url https://access.redhat.com/errata/RHSA-2026:0432
reference_id RHSA-2026:0432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0432
9
reference_url https://access.redhat.com/errata/RHSA-2026:0433
reference_id RHSA-2026:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0433
10
reference_url https://access.redhat.com/errata/RHSA-2026:0452
reference_id RHSA-2026:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0452
11
reference_url https://access.redhat.com/errata/RHSA-2026:0454
reference_id RHSA-2026:0454
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0454
12
reference_url https://access.redhat.com/errata/RHSA-2026:0483
reference_id RHSA-2026:0483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0483
13
reference_url https://www.wireshark.org/security/wnpa-sec-2025-06.html
reference_id wnpa-sec-2025-06.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/
url https://www.wireshark.org/security/wnpa-sec-2025-06.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-13499
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4
42
url VCID-r54z-8gcg-pqg7
vulnerability_id VCID-r54z-8gcg-pqg7
summary wireshark: MONGO dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00858
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00848
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00861
published_at 2026-04-07T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00865
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00863
published_at 2026-04-09T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00852
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00846
published_at 2026-04-12T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00859
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
reference_id 1117852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20724
reference_id 20724
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20724
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
reference_id 2403225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-04.html
reference_id wnpa-sec-2025-04.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/
url https://www.wireshark.org/security/wnpa-sec-2025-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-11626
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7
43
url VCID-r9dr-xdt4-vke2
vulnerability_id VCID-r9dr-xdt4-vke2
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19062
reference_id 19062
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19062
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
reference_id 2210822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210822
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
reference_id CVE-2023-2855.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-12.html
reference_id wnpa-sec-2023-12.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/
url https://www.wireshark.org/security/wnpa-sec-2023-12.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2855
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2
44
url VCID-ra98-yk72-bkfq
vulnerability_id VCID-ra98-yk72-bkfq
summary wireshark: Buffer Overflow in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33964
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33857
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33924
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33922
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3388
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
reference_id 1107515
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20509
reference_id 20509
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20509
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
reference_id 2370225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370225
7
reference_url https://www.wireshark.org/security/wnpa-sec-2025-02.html
reference_id wnpa-sec-2025-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/
url https://www.wireshark.org/security/wnpa-sec-2025-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2025-5601
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq
45
url VCID-s3e9-4cud-ufdn
vulnerability_id VCID-s3e9-4cud-ufdn
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31
published_at 2026-04-01T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31126
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31174
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31049
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31078
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31085
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31041
published_at 2026-04-12T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
reference_id 2039029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039029
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4190
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn
46
url VCID-shbm-pwte-rkgt
vulnerability_id VCID-shbm-pwte-rkgt
summary wireshark: Buffer Over-read in Wireshark
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06108
published_at 2026-04-13T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06115
published_at 2026-04-12T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07571
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07613
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07586
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20214
reference_id 20214
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20214
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
reference_id 2327763
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327763
6
reference_url https://www.wireshark.org/security/wnpa-sec-2024-15.html
reference_id wnpa-sec-2024-15.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/
url https://www.wireshark.org/security/wnpa-sec-2024-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2024-11596
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt
47
url VCID-sj7t-z4pv-7ucz
vulnerability_id VCID-sj7t-z4pv-7ucz
summary wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12647
published_at 2026-04-13T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12633
published_at 2026-04-07T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12711
published_at 2026-04-08T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12764
published_at 2026-04-09T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12733
published_at 2026-04-11T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-12T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12783
published_at 2026-04-02T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.1283
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19501
reference_id 19501
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19501
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
reference_id 2256656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256656
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-02.html
reference_id wnpa-sec-2024-02.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/
url https://www.wireshark.org/security/wnpa-sec-2024-02.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0209
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz
48
url VCID-t7vh-m6cf-rfef
vulnerability_id VCID-t7vh-m6cf-rfef
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29758
published_at 2026-04-13T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29933
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29748
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2981
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29845
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29854
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19068
reference_id 19068
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19068
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
reference_id 2210466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210466
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
reference_id CVE-2023-2879.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://www.wireshark.org/security/wnpa-sec-2023-14.html
reference_id wnpa-sec-2023-14.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/
url https://www.wireshark.org/security/wnpa-sec-2023-14.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2879
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef
49
url VCID-tk9u-gtk1-v3hm
vulnerability_id VCID-tk9u-gtk1-v3hm
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32366
published_at 2026-04-01T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32515
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3255
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32373
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32422
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32449
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32453
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32414
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32387
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
reference_id 2039011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039011
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
6
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm
50
url VCID-tvmn-b999-xya7
vulnerability_id VCID-tvmn-b999-xya7
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18183
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18007
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18238
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18025
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18086
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18101
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19081
reference_id 19081
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19081
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
reference_id 2210829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210829
6
reference_url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
reference_id CVE-2023-2858.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
11
reference_url https://access.redhat.com/errata/RHSA-2023:7015
reference_id RHSA-2023:7015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7015
12
reference_url https://www.wireshark.org/security/wnpa-sec-2023-15.html
reference_id wnpa-sec-2023-15.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/
url https://www.wireshark.org/security/wnpa-sec-2023-15.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-2858
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7
51
url VCID-tyxd-yfmx-z7d7
vulnerability_id VCID-tyxd-yfmx-z7d7
summary SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23382
published_at 2026-04-13T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-07T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23406
published_at 2026-04-08T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23457
published_at 2026-04-09T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23476
published_at 2026-04-11T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-12T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-02T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.2355
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8645
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19559
reference_id 19559
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19559
4
reference_url https://www.wireshark.org/security/wnpa-sec-2024-10.html
reference_id wnpa-sec-2024-10.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/
url https://www.wireshark.org/security/wnpa-sec-2024-10.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-8645
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7
52
url VCID-u22d-aazu-6khn
vulnerability_id VCID-u22d-aazu-6khn
summary wireshark: DoS (infinite loop) via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01362
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01367
published_at 2026-04-13T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01377
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01382
published_at 2026-04-09T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01371
published_at 2026-04-11T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01365
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
reference_id 2235812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235812
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-4511
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn
53
url VCID-vbn8-ghgq-n7g1
vulnerability_id VCID-vbn8-ghgq-n7g1
summary wireshark: DOCSIS dissector crash via packet injection or crafted capture file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.2411
published_at 2026-04-13T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24079
published_at 2026-04-07T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24146
published_at 2026-04-08T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24191
published_at 2026-04-09T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24209
published_at 2026-04-11T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24167
published_at 2026-04-12T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2426
published_at 2026-04-02T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24294
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
reference_id 1059925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19557
reference_id 19557
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19557
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
reference_id 2256652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2256652
7
reference_url https://www.wireshark.org/security/wnpa-sec-2024-05.html
reference_id wnpa-sec-2024-05.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/
url https://www.wireshark.org/security/wnpa-sec-2024-05.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2024-0211
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1
54
url VCID-whve-rre4-fbgr
vulnerability_id VCID-whve-rre4-fbgr
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53933
published_at 2026-04-01T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5395
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53953
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-09T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-11T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54033
published_at 2026-04-12T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54016
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
reference_id 2039009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039009
5
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2021-4184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr
55
url VCID-wqn1-t4m4-wben
vulnerability_id VCID-wqn1-t4m4-wben
summary Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02731
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02725
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02746
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02753
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02756
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02775
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0273
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
reference_id 1125690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690
5
reference_url https://gitlab.com/wireshark/wireshark/-/issues/20944
reference_id 20944
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://gitlab.com/wireshark/wireshark/-/issues/20944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
reference_id 2429762
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429762
7
reference_url https://www.wireshark.org/security/wnpa-sec-2026-04.html
reference_id wnpa-sec-2026-04.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/
url https://www.wireshark.org/security/wnpa-sec-2026-04.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
1
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1
aliases CVE-2026-0960
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben
56
url VCID-ycu3-e7vh-2qc4
vulnerability_id VCID-ycu3-e7vh-2qc4
summary Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
reference_id
reference_type
scores
0
value 0.01215
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-02T12:55:00Z
1
value 0.01371
scoring_system epss
scoring_elements 0.80224
published_at 2026-04-12T12:55:00Z
2
value 0.01371
scoring_system epss
scoring_elements 0.80194
published_at 2026-04-04T12:55:00Z
3
value 0.01371
scoring_system epss
scoring_elements 0.80183
published_at 2026-04-07T12:55:00Z
4
value 0.01371
scoring_system epss
scoring_elements 0.8021
published_at 2026-04-08T12:55:00Z
5
value 0.01371
scoring_system epss
scoring_elements 0.80219
published_at 2026-04-13T12:55:00Z
6
value 0.01371
scoring_system epss
scoring_elements 0.80238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/wireshark/wireshark/-/issues/19087
reference_id 19087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://gitlab.com/wireshark/wireshark/-/issues/19087
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
reference_id 2210835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2210835
6
reference_url https://takeonme.org/cves/CVE-2023-0668.html
reference_id CVE-2023-0668.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://takeonme.org/cves/CVE-2023-0668.html
7
reference_url https://www.debian.org/security/2023/dsa-5429
reference_id dsa-5429
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.debian.org/security/2023/dsa-5429
8
reference_url https://security.gentoo.org/glsa/202309-02
reference_id GLSA-202309-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://security.gentoo.org/glsa/202309-02
9
reference_url https://access.redhat.com/errata/RHSA-2023:6469
reference_id RHSA-2023:6469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6469
10
reference_url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
reference_id wireshark-4.0.6.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
11
reference_url https://www.wireshark.org/security/wnpa-sec-2023-19.html
reference_id wnpa-sec-2023-19.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/
url https://www.wireshark.org/security/wnpa-sec-2023-19.html
fixed_packages
0
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1
aliases CVE-2023-0668
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4
Fixing_vulnerabilities
0
url VCID-1uq1-jjn7-g3a7
vulnerability_id VCID-1uq1-jjn7-g3a7
summary wireshark: TCP dissector crash (wnpa-sec-2020-12)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25862.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25862
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.5297
published_at 2026-04-01T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.52994
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53019
published_at 2026-04-04T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.52986
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53037
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.5303
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.5308
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53064
published_at 2026-04-12T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1886041
reference_id 1886041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1886041
5
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-25862
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1uq1-jjn7-g3a7
1
url VCID-4vfa-7p4k-43cd
vulnerability_id VCID-4vfa-7p4k-43cd
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13164
reference_id
reference_type
scores
0
value 0.01829
scoring_system epss
scoring_elements 0.82838
published_at 2026-04-01T12:55:00Z
1
value 0.01829
scoring_system epss
scoring_elements 0.82854
published_at 2026-04-02T12:55:00Z
2
value 0.01829
scoring_system epss
scoring_elements 0.82867
published_at 2026-04-04T12:55:00Z
3
value 0.01829
scoring_system epss
scoring_elements 0.82863
published_at 2026-04-07T12:55:00Z
4
value 0.01829
scoring_system epss
scoring_elements 0.82888
published_at 2026-04-08T12:55:00Z
5
value 0.01829
scoring_system epss
scoring_elements 0.82896
published_at 2026-04-09T12:55:00Z
6
value 0.01829
scoring_system epss
scoring_elements 0.82911
published_at 2026-04-11T12:55:00Z
7
value 0.01829
scoring_system epss
scoring_elements 0.82906
published_at 2026-04-12T12:55:00Z
8
value 0.01829
scoring_system epss
scoring_elements 0.82903
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13164
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1839874
reference_id 1839874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1839874
5
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
6
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-13164
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vfa-7p4k-43cd
2
url VCID-5xwx-39yu-7uf4
vulnerability_id VCID-5xwx-39yu-7uf4
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22235.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22235
reference_id
reference_type
scores
0
value 0.00762
scoring_system epss
scoring_elements 0.73313
published_at 2026-04-01T12:55:00Z
1
value 0.00762
scoring_system epss
scoring_elements 0.73364
published_at 2026-04-13T12:55:00Z
2
value 0.00762
scoring_system epss
scoring_elements 0.73392
published_at 2026-04-11T12:55:00Z
3
value 0.00762
scoring_system epss
scoring_elements 0.73372
published_at 2026-04-12T12:55:00Z
4
value 0.00762
scoring_system epss
scoring_elements 0.73323
published_at 2026-04-02T12:55:00Z
5
value 0.00762
scoring_system epss
scoring_elements 0.73346
published_at 2026-04-04T12:55:00Z
6
value 0.00762
scoring_system epss
scoring_elements 0.73319
published_at 2026-04-07T12:55:00Z
7
value 0.00762
scoring_system epss
scoring_elements 0.73355
published_at 2026-04-08T12:55:00Z
8
value 0.00762
scoring_system epss
scoring_elements 0.73369
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2001872
reference_id 2001872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2001872
16
reference_url https://security.archlinux.org/ASA-202107-44
reference_id ASA-202107-44
reference_type
scores
url https://security.archlinux.org/ASA-202107-44
17
reference_url https://security.archlinux.org/AVG-2160
reference_id AVG-2160
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2160
18
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22235
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xwx-39yu-7uf4
3
url VCID-6fe6-kurv-juc2
vulnerability_id VCID-6fe6-kurv-juc2
summary wireshark: malformed packet on wire could make GQUIC protocol dissector loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28030
reference_id
reference_type
scores
0
value 0.01065
scoring_system epss
scoring_elements 0.77623
published_at 2026-04-01T12:55:00Z
1
value 0.01065
scoring_system epss
scoring_elements 0.77682
published_at 2026-04-13T12:55:00Z
2
value 0.01065
scoring_system epss
scoring_elements 0.77699
published_at 2026-04-11T12:55:00Z
3
value 0.01065
scoring_system epss
scoring_elements 0.77683
published_at 2026-04-12T12:55:00Z
4
value 0.01065
scoring_system epss
scoring_elements 0.7763
published_at 2026-04-02T12:55:00Z
5
value 0.01065
scoring_system epss
scoring_elements 0.77657
published_at 2026-04-04T12:55:00Z
6
value 0.01065
scoring_system epss
scoring_elements 0.7764
published_at 2026-04-07T12:55:00Z
7
value 0.01065
scoring_system epss
scoring_elements 0.77668
published_at 2026-04-08T12:55:00Z
8
value 0.01065
scoring_system epss
scoring_elements 0.77673
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1893110
reference_id 1893110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1893110
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689
reference_id 974689
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974689
6
reference_url https://security.archlinux.org/ASA-202011-13
reference_id ASA-202011-13
reference_type
scores
url https://security.archlinux.org/ASA-202011-13
7
reference_url https://security.archlinux.org/AVG-1258
reference_id AVG-1258
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1258
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-28030
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fe6-kurv-juc2
4
url VCID-6j8g-t9x7-3kg2
vulnerability_id VCID-6j8g-t9x7-3kg2
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39926.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39926
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76218
published_at 2026-04-01T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76279
published_at 2026-04-13T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-11T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.76284
published_at 2026-04-12T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76222
published_at 2026-04-02T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76254
published_at 2026-04-04T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76234
published_at 2026-04-07T12:55:00Z
7
value 0.00942
scoring_system epss
scoring_elements 0.76266
published_at 2026-04-08T12:55:00Z
8
value 0.00942
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39926
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025672
reference_id 2025672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025672
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39926
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6j8g-t9x7-3kg2
5
url VCID-7jda-z5mm-duh7
vulnerability_id VCID-7jda-z5mm-duh7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26418
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.60886
published_at 2026-04-01T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.61004
published_at 2026-04-13T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.61039
published_at 2026-04-11T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-12T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-02T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.60988
published_at 2026-04-04T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.60953
published_at 2026-04-07T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61001
published_at 2026-04-08T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61017
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919912
reference_id 1919912
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919912
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-26418
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jda-z5mm-duh7
6
url VCID-87w2-12tn-fud7
vulnerability_id VCID-87w2-12tn-fud7
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39924
reference_id
reference_type
scores
0
value 0.01337
scoring_system epss
scoring_elements 0.79942
published_at 2026-04-01T12:55:00Z
1
value 0.01337
scoring_system epss
scoring_elements 0.79992
published_at 2026-04-13T12:55:00Z
2
value 0.01337
scoring_system epss
scoring_elements 0.80016
published_at 2026-04-11T12:55:00Z
3
value 0.01337
scoring_system epss
scoring_elements 0.8
published_at 2026-04-12T12:55:00Z
4
value 0.01337
scoring_system epss
scoring_elements 0.79949
published_at 2026-04-02T12:55:00Z
5
value 0.01337
scoring_system epss
scoring_elements 0.7997
published_at 2026-04-04T12:55:00Z
6
value 0.01337
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-07T12:55:00Z
7
value 0.01337
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-08T12:55:00Z
8
value 0.01337
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39924
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025668
reference_id 2025668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025668
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39924
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87w2-12tn-fud7
7
url VCID-8ab7-hs6k-puan
vulnerability_id VCID-8ab7-hs6k-puan
summary wireshark: BLIP dissector crash (wnpa-sec-2020-13)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25866.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25866
reference_id
reference_type
scores
0
value 0.01315
scoring_system epss
scoring_elements 0.79791
published_at 2026-04-01T12:55:00Z
1
value 0.01315
scoring_system epss
scoring_elements 0.79799
published_at 2026-04-02T12:55:00Z
2
value 0.01315
scoring_system epss
scoring_elements 0.79819
published_at 2026-04-04T12:55:00Z
3
value 0.01315
scoring_system epss
scoring_elements 0.79807
published_at 2026-04-07T12:55:00Z
4
value 0.01315
scoring_system epss
scoring_elements 0.79836
published_at 2026-04-08T12:55:00Z
5
value 0.01315
scoring_system epss
scoring_elements 0.79844
published_at 2026-04-09T12:55:00Z
6
value 0.01315
scoring_system epss
scoring_elements 0.79866
published_at 2026-04-11T12:55:00Z
7
value 0.01315
scoring_system epss
scoring_elements 0.79849
published_at 2026-04-12T12:55:00Z
8
value 0.01315
scoring_system epss
scoring_elements 0.79841
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1886051
reference_id 1886051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1886051
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-25866
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ab7-hs6k-puan
8
url VCID-8wq4-n82v-pucg
vulnerability_id VCID-8wq4-n82v-pucg
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39920
reference_id
reference_type
scores
0
value 0.00525
scoring_system epss
scoring_elements 0.66923
published_at 2026-04-01T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.66998
published_at 2026-04-13T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.67043
published_at 2026-04-11T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.67029
published_at 2026-04-12T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.66961
published_at 2026-04-07T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.66987
published_at 2026-04-04T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-08T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67023
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39920
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025653
reference_id 2025653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025653
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39920
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wq4-n82v-pucg
9
url VCID-am55-5vja-nffg
vulnerability_id VCID-am55-5vja-nffg
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22222.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22222
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40568
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.4065
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40678
published_at 2026-04-04T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40649
published_at 2026-04-08T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40658
published_at 2026-04-09T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40676
published_at 2026-04-11T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40639
published_at 2026-04-12T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.4062
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2001867
reference_id 2001867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2001867
15
reference_url https://security.archlinux.org/ASA-202106-30
reference_id ASA-202106-30
reference_type
scores
url https://security.archlinux.org/ASA-202106-30
16
reference_url https://security.archlinux.org/AVG-2037
reference_id AVG-2037
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2037
17
reference_url https://security.gentoo.org/glsa/202107-21
reference_id GLSA-202107-21
reference_type
scores
url https://security.gentoo.org/glsa/202107-21
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22222
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am55-5vja-nffg
10
url VCID-bte7-m2d2-sbar
vulnerability_id VCID-bte7-m2d2-sbar
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39922
reference_id
reference_type
scores
0
value 0.04625
scoring_system epss
scoring_elements 0.89227
published_at 2026-04-01T12:55:00Z
1
value 0.04625
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-13T12:55:00Z
2
value 0.04625
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-11T12:55:00Z
3
value 0.04625
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-12T12:55:00Z
4
value 0.04625
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-02T12:55:00Z
5
value 0.04625
scoring_system epss
scoring_elements 0.89247
published_at 2026-04-04T12:55:00Z
6
value 0.04625
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-07T12:55:00Z
7
value 0.04625
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-08T12:55:00Z
8
value 0.04625
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025665
reference_id 2025665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025665
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39922
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bte7-m2d2-sbar
11
url VCID-cwfd-d1xv-1fhe
vulnerability_id VCID-cwfd-d1xv-1fhe
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26575.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26575
reference_id
reference_type
scores
0
value 0.02233
scoring_system epss
scoring_elements 0.84463
published_at 2026-04-01T12:55:00Z
1
value 0.02233
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-02T12:55:00Z
2
value 0.02233
scoring_system epss
scoring_elements 0.84498
published_at 2026-04-04T12:55:00Z
3
value 0.02233
scoring_system epss
scoring_elements 0.845
published_at 2026-04-07T12:55:00Z
4
value 0.02233
scoring_system epss
scoring_elements 0.84521
published_at 2026-04-08T12:55:00Z
5
value 0.02233
scoring_system epss
scoring_elements 0.84527
published_at 2026-04-09T12:55:00Z
6
value 0.02233
scoring_system epss
scoring_elements 0.84545
published_at 2026-04-11T12:55:00Z
7
value 0.02233
scoring_system epss
scoring_elements 0.8454
published_at 2026-04-12T12:55:00Z
8
value 0.02233
scoring_system epss
scoring_elements 0.84536
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26575
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1886047
reference_id 1886047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1886047
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974688
reference_id 974688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974688
6
reference_url https://security.gentoo.org/glsa/202011-08
reference_id GLSA-202011-08
reference_type
scores
url https://security.gentoo.org/glsa/202011-08
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-26575
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfd-d1xv-1fhe
12
url VCID-czva-ymjk-8qfn
vulnerability_id VCID-czva-ymjk-8qfn
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9429
reference_id
reference_type
scores
0
value 0.00586
scoring_system epss
scoring_elements 0.69016
published_at 2026-04-01T12:55:00Z
1
value 0.00586
scoring_system epss
scoring_elements 0.69032
published_at 2026-04-02T12:55:00Z
2
value 0.00586
scoring_system epss
scoring_elements 0.69053
published_at 2026-04-04T12:55:00Z
3
value 0.00586
scoring_system epss
scoring_elements 0.69033
published_at 2026-04-07T12:55:00Z
4
value 0.00586
scoring_system epss
scoring_elements 0.69083
published_at 2026-04-08T12:55:00Z
5
value 0.00586
scoring_system epss
scoring_elements 0.69103
published_at 2026-04-09T12:55:00Z
6
value 0.00586
scoring_system epss
scoring_elements 0.69126
published_at 2026-04-11T12:55:00Z
7
value 0.00586
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-12T12:55:00Z
8
value 0.00586
scoring_system epss
scoring_elements 0.69081
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9429
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828780
reference_id 1828780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828780
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-9429
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czva-ymjk-8qfn
13
url VCID-d6d5-wvzh-1uet
vulnerability_id VCID-d6d5-wvzh-1uet
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39921
reference_id
reference_type
scores
0
value 0.01341
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-01T12:55:00Z
1
value 0.01341
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-13T12:55:00Z
2
value 0.01341
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-11T12:55:00Z
3
value 0.01341
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-12T12:55:00Z
4
value 0.01341
scoring_system epss
scoring_elements 0.79975
published_at 2026-04-02T12:55:00Z
5
value 0.01341
scoring_system epss
scoring_elements 0.79997
published_at 2026-04-04T12:55:00Z
6
value 0.01341
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-07T12:55:00Z
7
value 0.01341
scoring_system epss
scoring_elements 0.80015
published_at 2026-04-08T12:55:00Z
8
value 0.01341
scoring_system epss
scoring_elements 0.80024
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025662
reference_id 2025662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025662
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39921
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d6d5-wvzh-1uet
14
url VCID-ehzy-8yet-g3fz
vulnerability_id VCID-ehzy-8yet-g3fz
summary wireshark: invalid memory access in BT ATT dissector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7045.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7045
reference_id
reference_type
scores
0
value 0.00244
scoring_system epss
scoring_elements 0.47565
published_at 2026-04-01T12:55:00Z
1
value 0.00244
scoring_system epss
scoring_elements 0.47604
published_at 2026-04-02T12:55:00Z
2
value 0.00244
scoring_system epss
scoring_elements 0.47625
published_at 2026-04-12T12:55:00Z
3
value 0.00244
scoring_system epss
scoring_elements 0.47574
published_at 2026-04-07T12:55:00Z
4
value 0.00244
scoring_system epss
scoring_elements 0.47629
published_at 2026-04-08T12:55:00Z
5
value 0.00244
scoring_system epss
scoring_elements 0.47649
published_at 2026-04-11T12:55:00Z
6
value 0.00244
scoring_system epss
scoring_elements 0.47634
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7045
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1798671
reference_id 1798671
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1798671
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-7045
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehzy-8yet-g3fz
15
url VCID-fe3n-22be-cfc1
vulnerability_id VCID-fe3n-22be-cfc1
summary wireshark: CMS dissector crash (wnpa-sec-2019-22)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19553.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19553
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.70945
published_at 2026-04-01T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.70955
published_at 2026-04-02T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70973
published_at 2026-04-04T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.70948
published_at 2026-04-07T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.7099
published_at 2026-04-08T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.71005
published_at 2026-04-09T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.71028
published_at 2026-04-11T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.71012
published_at 2026-04-12T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.70995
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1782988
reference_id 1782988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1782988
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2019-19553
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fe3n-22be-cfc1
16
url VCID-gbxm-9qd8-dbh4
vulnerability_id VCID-gbxm-9qd8-dbh4
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22174.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22174
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40866
published_at 2026-04-01T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40922
published_at 2026-04-13T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40959
published_at 2026-04-09T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40942
published_at 2026-04-12T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40948
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40977
published_at 2026-04-11T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40903
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40952
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922465
reference_id 1922465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922465
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791
reference_id 981791
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791
6
reference_url https://security.archlinux.org/ASA-202102-3
reference_id ASA-202102-3
reference_type
scores
url https://security.archlinux.org/ASA-202102-3
7
reference_url https://security.archlinux.org/AVG-1510
reference_id AVG-1510
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1510
8
reference_url https://security.gentoo.org/glsa/202107-21
reference_id GLSA-202107-21
reference_type
scores
url https://security.gentoo.org/glsa/202107-21
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22174
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbxm-9qd8-dbh4
17
url VCID-gpjx-7syp-2yc7
vulnerability_id VCID-gpjx-7syp-2yc7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9430
reference_id
reference_type
scores
0
value 0.03608
scoring_system epss
scoring_elements 0.87724
published_at 2026-04-01T12:55:00Z
1
value 0.03608
scoring_system epss
scoring_elements 0.87735
published_at 2026-04-02T12:55:00Z
2
value 0.03608
scoring_system epss
scoring_elements 0.87748
published_at 2026-04-04T12:55:00Z
3
value 0.03608
scoring_system epss
scoring_elements 0.87751
published_at 2026-04-07T12:55:00Z
4
value 0.03608
scoring_system epss
scoring_elements 0.87772
published_at 2026-04-08T12:55:00Z
5
value 0.03608
scoring_system epss
scoring_elements 0.87778
published_at 2026-04-09T12:55:00Z
6
value 0.03608
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-11T12:55:00Z
7
value 0.03608
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-12T12:55:00Z
8
value 0.03608
scoring_system epss
scoring_elements 0.87782
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9430
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814615
reference_id 1814615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814615
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-9430
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gpjx-7syp-2yc7
18
url VCID-h87k-w6dk-bqfy
vulnerability_id VCID-h87k-w6dk-bqfy
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22173.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22173
reference_id
reference_type
scores
0
value 0.00499
scoring_system epss
scoring_elements 0.65834
published_at 2026-04-01T12:55:00Z
1
value 0.00499
scoring_system epss
scoring_elements 0.65909
published_at 2026-04-13T12:55:00Z
2
value 0.00499
scoring_system epss
scoring_elements 0.65952
published_at 2026-04-11T12:55:00Z
3
value 0.00499
scoring_system epss
scoring_elements 0.65939
published_at 2026-04-12T12:55:00Z
4
value 0.00499
scoring_system epss
scoring_elements 0.65875
published_at 2026-04-02T12:55:00Z
5
value 0.00499
scoring_system epss
scoring_elements 0.65905
published_at 2026-04-04T12:55:00Z
6
value 0.00499
scoring_system epss
scoring_elements 0.65871
published_at 2026-04-07T12:55:00Z
7
value 0.00499
scoring_system epss
scoring_elements 0.65923
published_at 2026-04-08T12:55:00Z
8
value 0.00499
scoring_system epss
scoring_elements 0.65934
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22173
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922467
reference_id 1922467
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922467
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791
reference_id 981791
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981791
6
reference_url https://security.archlinux.org/ASA-202102-3
reference_id ASA-202102-3
reference_type
scores
url https://security.archlinux.org/ASA-202102-3
7
reference_url https://security.archlinux.org/AVG-1510
reference_id AVG-1510
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1510
8
reference_url https://security.gentoo.org/glsa/202107-21
reference_id GLSA-202107-21
reference_type
scores
url https://security.gentoo.org/glsa/202107-21
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22173
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h87k-w6dk-bqfy
19
url VCID-hgjv-hfcn-b3hk
vulnerability_id VCID-hgjv-hfcn-b3hk
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22207.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22207
reference_id
reference_type
scores
0
value 0.0047
scoring_system epss
scoring_elements 0.64503
published_at 2026-04-01T12:55:00Z
1
value 0.0047
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-13T12:55:00Z
2
value 0.0047
scoring_system epss
scoring_elements 0.64625
published_at 2026-04-11T12:55:00Z
3
value 0.0047
scoring_system epss
scoring_elements 0.64613
published_at 2026-04-12T12:55:00Z
4
value 0.0047
scoring_system epss
scoring_elements 0.64557
published_at 2026-04-02T12:55:00Z
5
value 0.0047
scoring_system epss
scoring_elements 0.64585
published_at 2026-04-04T12:55:00Z
6
value 0.0047
scoring_system epss
scoring_elements 0.64543
published_at 2026-04-07T12:55:00Z
7
value 0.0047
scoring_system epss
scoring_elements 0.64591
published_at 2026-04-08T12:55:00Z
8
value 0.0047
scoring_system epss
scoring_elements 0.64608
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22207
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1952964
reference_id 1952964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1952964
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987853
reference_id 987853
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987853
17
reference_url https://security.archlinux.org/AVG-1864
reference_id AVG-1864
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1864
18
reference_url https://security.gentoo.org/glsa/202107-21
reference_id GLSA-202107-21
reference_type
scores
url https://security.gentoo.org/glsa/202107-21
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22207
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgjv-hfcn-b3hk
20
url VCID-hmmj-jw2d-53cd
vulnerability_id VCID-hmmj-jw2d-53cd
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26420
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62281
published_at 2026-04-01T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-13T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-11T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62411
published_at 2026-04-12T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-02T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-04T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-07T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-08T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62401
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919919
reference_id 1919919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919919
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-26420
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmmj-jw2d-53cd
21
url VCID-k427-1bka-byfx
vulnerability_id VCID-k427-1bka-byfx
summary
A vulnerability in Wireshark could lead to a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17498.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17498
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45743
published_at 2026-04-01T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45813
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45835
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45784
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45841
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45839
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.4586
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.4583
published_at 2026-04-12T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45834
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17498
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17498
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868885
reference_id 1868885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868885
5
reference_url https://security.gentoo.org/glsa/202008-14
reference_id GLSA-202008-14
reference_type
scores
url https://security.gentoo.org/glsa/202008-14
6
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-17498
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k427-1bka-byfx
22
url VCID-krdu-8g4g-tbbm
vulnerability_id VCID-krdu-8g4g-tbbm
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26419
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62281
published_at 2026-04-01T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-02T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62369
published_at 2026-04-04T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62334
published_at 2026-04-07T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62384
published_at 2026-04-08T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62401
published_at 2026-04-09T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-11T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62411
published_at 2026-04-12T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62388
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919917
reference_id 1919917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919917
4
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
5
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-26419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krdu-8g4g-tbbm
23
url VCID-ksba-7n8u-m7fy
vulnerability_id VCID-ksba-7n8u-m7fy
summary wireshark: WASSP dissector crash (wnpa-sec-2020-01)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7044.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7044
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.7119
published_at 2026-04-09T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-11T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71199
published_at 2026-04-12T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-07T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72517
published_at 2026-04-02T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.72533
published_at 2026-04-04T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72549
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7044
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796459
reference_id 1796459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796459
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-7044
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksba-7n8u-m7fy
24
url VCID-m91z-38xy-h3g6
vulnerability_id VCID-m91z-38xy-h3g6
summary wireshark: PNRP dissector large loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39923.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39923
reference_id
reference_type
scores
0
value 0.0225
scoring_system epss
scoring_elements 0.8451
published_at 2026-04-01T12:55:00Z
1
value 0.0225
scoring_system epss
scoring_elements 0.84525
published_at 2026-04-02T12:55:00Z
2
value 0.0225
scoring_system epss
scoring_elements 0.84547
published_at 2026-04-04T12:55:00Z
3
value 0.0225
scoring_system epss
scoring_elements 0.8455
published_at 2026-04-07T12:55:00Z
4
value 0.0225
scoring_system epss
scoring_elements 0.84572
published_at 2026-04-08T12:55:00Z
5
value 0.0225
scoring_system epss
scoring_elements 0.84578
published_at 2026-04-09T12:55:00Z
6
value 0.0225
scoring_system epss
scoring_elements 0.84597
published_at 2026-04-11T12:55:00Z
7
value 0.0225
scoring_system epss
scoring_elements 0.84592
published_at 2026-04-12T12:55:00Z
8
value 0.0225
scoring_system epss
scoring_elements 0.84588
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025686
reference_id 2025686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025686
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39923
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m91z-38xy-h3g6
25
url VCID-rxqs-mf12-jkcf
vulnerability_id VCID-rxqs-mf12-jkcf
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26421
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27753
published_at 2026-04-01T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27637
published_at 2026-04-13T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27739
published_at 2026-04-11T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27695
published_at 2026-04-12T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27794
published_at 2026-04-02T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27833
published_at 2026-04-04T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27624
published_at 2026-04-07T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.2769
published_at 2026-04-08T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27734
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919923
reference_id 1919923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919923
5
reference_url https://security.archlinux.org/AVG-1352
reference_id AVG-1352
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1352
6
reference_url https://security.gentoo.org/glsa/202101-12
reference_id GLSA-202101-12
reference_type
scores
url https://security.gentoo.org/glsa/202101-12
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-26421
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rxqs-mf12-jkcf
26
url VCID-tvz6-1mnb-3bbz
vulnerability_id VCID-tvz6-1mnb-3bbz
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39925
reference_id
reference_type
scores
0
value 0.04625
scoring_system epss
scoring_elements 0.89227
published_at 2026-04-01T12:55:00Z
1
value 0.04625
scoring_system epss
scoring_elements 0.89273
published_at 2026-04-13T12:55:00Z
2
value 0.04625
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-11T12:55:00Z
3
value 0.04625
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-12T12:55:00Z
4
value 0.04625
scoring_system epss
scoring_elements 0.89233
published_at 2026-04-02T12:55:00Z
5
value 0.04625
scoring_system epss
scoring_elements 0.89247
published_at 2026-04-04T12:55:00Z
6
value 0.04625
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-07T12:55:00Z
7
value 0.04625
scoring_system epss
scoring_elements 0.89267
published_at 2026-04-08T12:55:00Z
8
value 0.04625
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025670
reference_id 2025670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025670
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39925
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvz6-1mnb-3bbz
27
url VCID-ua7j-jegt-w7au
vulnerability_id VCID-ua7j-jegt-w7au
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9431
reference_id
reference_type
scores
0
value 0.04397
scoring_system epss
scoring_elements 0.88947
published_at 2026-04-01T12:55:00Z
1
value 0.04397
scoring_system epss
scoring_elements 0.88955
published_at 2026-04-02T12:55:00Z
2
value 0.04397
scoring_system epss
scoring_elements 0.88971
published_at 2026-04-04T12:55:00Z
3
value 0.04397
scoring_system epss
scoring_elements 0.88974
published_at 2026-04-07T12:55:00Z
4
value 0.04397
scoring_system epss
scoring_elements 0.88992
published_at 2026-04-08T12:55:00Z
5
value 0.04397
scoring_system epss
scoring_elements 0.88997
published_at 2026-04-09T12:55:00Z
6
value 0.04397
scoring_system epss
scoring_elements 0.89009
published_at 2026-04-11T12:55:00Z
7
value 0.04397
scoring_system epss
scoring_elements 0.89004
published_at 2026-04-12T12:55:00Z
8
value 0.04397
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9431
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814586
reference_id 1814586
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814586
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-9431
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua7j-jegt-w7au
28
url VCID-vw97-3475-wqaa
vulnerability_id VCID-vw97-3475-wqaa
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39928
reference_id
reference_type
scores
0
value 0.01341
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-01T12:55:00Z
1
value 0.01341
scoring_system epss
scoring_elements 0.8002
published_at 2026-04-13T12:55:00Z
2
value 0.01341
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-11T12:55:00Z
3
value 0.01341
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-12T12:55:00Z
4
value 0.01341
scoring_system epss
scoring_elements 0.79975
published_at 2026-04-02T12:55:00Z
5
value 0.01341
scoring_system epss
scoring_elements 0.79997
published_at 2026-04-04T12:55:00Z
6
value 0.01341
scoring_system epss
scoring_elements 0.79987
published_at 2026-04-07T12:55:00Z
7
value 0.01341
scoring_system epss
scoring_elements 0.80015
published_at 2026-04-08T12:55:00Z
8
value 0.01341
scoring_system epss
scoring_elements 0.80024
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025675
reference_id 2025675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025675
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39928
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vw97-3475-wqaa
29
url VCID-vxnv-5h57-2uhu
vulnerability_id VCID-vxnv-5h57-2uhu
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22191.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22191.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22191
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50553
published_at 2026-04-01T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50642
published_at 2026-04-13T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.5068
published_at 2026-04-11T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50657
published_at 2026-04-12T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50605
published_at 2026-04-02T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50633
published_at 2026-04-04T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-07T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50641
published_at 2026-04-08T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50637
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22191
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941478
reference_id 1941478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941478
5
reference_url https://security.archlinux.org/ASA-202103-2
reference_id ASA-202103-2
reference_type
scores
url https://security.archlinux.org/ASA-202103-2
6
reference_url https://security.archlinux.org/AVG-1669
reference_id AVG-1669
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1669
7
reference_url https://security.gentoo.org/glsa/202107-21
reference_id GLSA-202107-21
reference_type
scores
url https://security.gentoo.org/glsa/202107-21
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-22191
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxnv-5h57-2uhu
30
url VCID-w8ha-2d3q-q3dz
vulnerability_id VCID-w8ha-2d3q-q3dz
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9428
reference_id
reference_type
scores
0
value 0.08184
scoring_system epss
scoring_elements 0.92163
published_at 2026-04-01T12:55:00Z
1
value 0.08184
scoring_system epss
scoring_elements 0.9217
published_at 2026-04-02T12:55:00Z
2
value 0.08184
scoring_system epss
scoring_elements 0.92176
published_at 2026-04-04T12:55:00Z
3
value 0.08184
scoring_system epss
scoring_elements 0.92179
published_at 2026-04-07T12:55:00Z
4
value 0.08184
scoring_system epss
scoring_elements 0.92191
published_at 2026-04-08T12:55:00Z
5
value 0.08184
scoring_system epss
scoring_elements 0.92194
published_at 2026-04-09T12:55:00Z
6
value 0.08184
scoring_system epss
scoring_elements 0.92199
published_at 2026-04-12T12:55:00Z
7
value 0.08184
scoring_system epss
scoring_elements 0.92196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9428
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1814622
reference_id 1814622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1814622
4
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-9428
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ha-2d3q-q3dz
31
url VCID-wva9-tbc7-73a3
vulnerability_id VCID-wva9-tbc7-73a3
summary wireshark: MIME multipart dissector crash (wnpa-sec-2020-11)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25863.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25863
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47796
published_at 2026-04-01T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47834
published_at 2026-04-02T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47856
published_at 2026-04-04T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47805
published_at 2026-04-07T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47857
published_at 2026-04-08T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47853
published_at 2026-04-09T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47877
published_at 2026-04-11T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47854
published_at 2026-04-12T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.47863
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1886044
reference_id 1886044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1886044
5
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-25863
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wva9-tbc7-73a3
32
url VCID-xrrb-yszf-k3au
vulnerability_id VCID-xrrb-yszf-k3au
summary Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39929
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.3532
published_at 2026-04-01T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35426
published_at 2026-04-07T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35544
published_at 2026-04-04T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35472
published_at 2026-04-08T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35496
published_at 2026-04-09T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35507
published_at 2026-04-11T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35519
published_at 2026-04-02T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36756
published_at 2026-04-13T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36781
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22207
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22222
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22235
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39920
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39921
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39922
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39923
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39924
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39926
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39929
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025678
reference_id 2025678
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025678
16
reference_url https://security.archlinux.org/AVG-2564
reference_id AVG-2564
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2564
17
reference_url https://security.gentoo.org/glsa/202210-04
reference_id GLSA-202210-04
reference_type
scores
url https://security.gentoo.org/glsa/202210-04
18
reference_url https://usn.ubuntu.com/7552-1/
reference_id USN-7552-1
reference_type
scores
url https://usn.ubuntu.com/7552-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2021-39929
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xrrb-yszf-k3au
33
url VCID-y7g1-vrbz-t3eu
vulnerability_id VCID-y7g1-vrbz-t3eu
summary wireshark: gryphon dissector infinite loop (wnpa-sec-2019-21)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16319.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16319.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16319
reference_id
reference_type
scores
0
value 0.00701
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-01T12:55:00Z
1
value 0.00701
scoring_system epss
scoring_elements 0.72028
published_at 2026-04-13T12:55:00Z
2
value 0.00701
scoring_system epss
scoring_elements 0.72036
published_at 2026-04-09T12:55:00Z
3
value 0.00701
scoring_system epss
scoring_elements 0.72059
published_at 2026-04-11T12:55:00Z
4
value 0.00701
scoring_system epss
scoring_elements 0.72043
published_at 2026-04-12T12:55:00Z
5
value 0.00701
scoring_system epss
scoring_elements 0.71989
published_at 2026-04-02T12:55:00Z
6
value 0.00701
scoring_system epss
scoring_elements 0.72009
published_at 2026-04-04T12:55:00Z
7
value 0.00701
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-07T12:55:00Z
8
value 0.00701
scoring_system epss
scoring_elements 0.72024
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16319
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16020
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=02ddd49885c6a09e936a76aceb726ed06539704a
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16319
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2019-21.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2019-21.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775149
reference_id 1775149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775149
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16319
reference_id CVE-2019-16319
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-16319
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2019-16319
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7g1-vrbz-t3eu
34
url VCID-yx64-zwpx-pkg7
vulnerability_id VCID-yx64-zwpx-pkg7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11647.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11647
reference_id
reference_type
scores
0
value 0.01672
scoring_system epss
scoring_elements 0.82063
published_at 2026-04-01T12:55:00Z
1
value 0.01672
scoring_system epss
scoring_elements 0.82128
published_at 2026-04-13T12:55:00Z
2
value 0.01672
scoring_system epss
scoring_elements 0.82119
published_at 2026-04-08T12:55:00Z
3
value 0.01672
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-09T12:55:00Z
4
value 0.01672
scoring_system epss
scoring_elements 0.82145
published_at 2026-04-11T12:55:00Z
5
value 0.01672
scoring_system epss
scoring_elements 0.82136
published_at 2026-04-12T12:55:00Z
6
value 0.01672
scoring_system epss
scoring_elements 0.82075
published_at 2026-04-02T12:55:00Z
7
value 0.01672
scoring_system epss
scoring_elements 0.82096
published_at 2026-04-04T12:55:00Z
8
value 0.01672
scoring_system epss
scoring_elements 0.82092
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11647
4
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
5
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11647
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
9
reference_url https://www.wireshark.org/security/wnpa-sec-2020-07.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2020-07.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1824157
reference_id 1824157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1824157
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213
reference_id 958213
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958213
12
reference_url https://security.archlinux.org/ASA-202004-10
reference_id ASA-202004-10
reference_type
scores
url https://security.archlinux.org/ASA-202004-10
13
reference_url https://security.archlinux.org/AVG-1129
reference_id AVG-1129
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1129
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11647
reference_id CVE-2020-11647
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-11647
19
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-11647
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx64-zwpx-pkg7
35
url VCID-yx6e-pvpm-2fh7
vulnerability_id VCID-yx6e-pvpm-2fh7
summary
Multiple vulnerabilities have been found in Wireshark, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15466
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70231
published_at 2026-04-01T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70293
published_at 2026-04-13T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-11T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70306
published_at 2026-04-12T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-02T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.7026
published_at 2026-04-04T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70237
published_at 2026-04-07T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70283
published_at 2026-04-08T12:55:00Z
8
value 0.00631
scoring_system epss
scoring_elements 0.70298
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15466
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1854882
reference_id 1854882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1854882
5
reference_url https://security.archlinux.org/ASA-202007-2
reference_id ASA-202007-2
reference_type
scores
url https://security.archlinux.org/ASA-202007-2
6
reference_url https://security.archlinux.org/AVG-1198
reference_id AVG-1198
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1198
7
reference_url https://security.gentoo.org/glsa/202007-13
reference_id GLSA-202007-13
reference_type
scores
url https://security.gentoo.org/glsa/202007-13
8
reference_url https://usn.ubuntu.com/6262-1/
reference_id USN-6262-1
reference_type
scores
url https://usn.ubuntu.com/6262-1/
fixed_packages
0
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-18xy-vuns-eqcx
2
vulnerability VCID-1b6n-9bub-1ueu
3
vulnerability VCID-1dz1-t49g-47bx
4
vulnerability VCID-23d3-1z9s-r7ht
5
vulnerability VCID-2bjq-y76h-qbhd
6
vulnerability VCID-2pgm-khz1-auay
7
vulnerability VCID-436x-av41-43g4
8
vulnerability VCID-63pm-hact-8ybw
9
vulnerability VCID-6exv-jrtx-8yab
10
vulnerability VCID-7cgx-1cxn-7bdk
11
vulnerability VCID-9b6w-s1cn-57hz
12
vulnerability VCID-a9rv-3ka3-67fr
13
vulnerability VCID-beux-z8f3-bbg4
14
vulnerability VCID-ce6b-zqtu-jkdt
15
vulnerability VCID-cvch-5rbz-gyah
16
vulnerability VCID-d1fd-fcrt-j7bj
17
vulnerability VCID-d95z-wdv1-yye6
18
vulnerability VCID-dc45-d39b-u7bt
19
vulnerability VCID-dy74-uv3r-x7bs
20
vulnerability VCID-eed3-ztv5-yqg9
21
vulnerability VCID-end1-k29u-m7g8
22
vulnerability VCID-eqkh-wnhk-5fdh
23
vulnerability VCID-fve5-m93p-vbf3
24
vulnerability VCID-g38d-wdq8-sfgv
25
vulnerability VCID-h36t-f662-4ufw
26
vulnerability VCID-h51a-cp8r-r3fx
27
vulnerability VCID-jka6-e5fr-rkcv
28
vulnerability VCID-jknb-n171-8udz
29
vulnerability VCID-k49z-j5v1-pkhf
30
vulnerability VCID-k6r8-3ckd-87bf
31
vulnerability VCID-kpe5-12b6-pbes
32
vulnerability VCID-ksm5-9amq-aqg1
33
vulnerability VCID-ktks-hvzs-c7ep
34
vulnerability VCID-ky3g-7wfh-v7fz
35
vulnerability VCID-m58x-8cam-3fdy
36
vulnerability VCID-mb3r-da54-7kfk
37
vulnerability VCID-ne4k-vht4-rue7
38
vulnerability VCID-p3ew-pwr9-7yek
39
vulnerability VCID-prdk-zfnn-cyg3
40
vulnerability VCID-prz6-jk3b-wbhw
41
vulnerability VCID-qs6k-my1v-8qh4
42
vulnerability VCID-r54z-8gcg-pqg7
43
vulnerability VCID-r9dr-xdt4-vke2
44
vulnerability VCID-ra98-yk72-bkfq
45
vulnerability VCID-s3e9-4cud-ufdn
46
vulnerability VCID-shbm-pwte-rkgt
47
vulnerability VCID-sj7t-z4pv-7ucz
48
vulnerability VCID-t7vh-m6cf-rfef
49
vulnerability VCID-tk9u-gtk1-v3hm
50
vulnerability VCID-tvmn-b999-xya7
51
vulnerability VCID-tyxd-yfmx-z7d7
52
vulnerability VCID-u22d-aazu-6khn
53
vulnerability VCID-vbn8-ghgq-n7g1
54
vulnerability VCID-whve-rre4-fbgr
55
vulnerability VCID-wqn1-t4m4-wben
56
vulnerability VCID-ycu3-e7vh-2qc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1
aliases CVE-2020-15466
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx6e-pvpm-2fh7
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1