Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wireshark@4.6.4-1
Typedeb
Namespacedebian
Namewireshark
Version4.6.4-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2ra8-e2ag-cuh9
vulnerability_id VCID-2ra8-e2ag-cuh9
summary SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5655
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://gitlab.com/wireshark/wireshark/-/issues/21112
reference_id 21112
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-30T12:52:18Z/
url https://gitlab.com/wireshark/wireshark/-/issues/21112
3
reference_url https://www.wireshark.org/security/wnpa-sec-2026-19.html
reference_id wnpa-sec-2026-19.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-30T12:52:18Z/
url https://www.wireshark.org/security/wnpa-sec-2026-19.html
fixed_packages
aliases CVE-2026-5655
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ra8-e2ag-cuh9
1
url VCID-7m5n-82x7-vfen
vulnerability_id VCID-7m5n-82x7-vfen
summary
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6528
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
aliases CVE-2026-6528
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7m5n-82x7-vfen
2
url VCID-gqrh-exr5-pbfe
vulnerability_id VCID-gqrh-exr5-pbfe
summary
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6526
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
aliases CVE-2026-6526
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqrh-exr5-pbfe
3
url VCID-m2de-ys7x-6qdp
vulnerability_id VCID-m2de-ys7x-6qdp
summary TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5402
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://gitlab.com/wireshark/wireshark/-/issues/21090
reference_id 21090
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-30T12:51:10Z/
url https://gitlab.com/wireshark/wireshark/-/issues/21090
3
reference_url https://www.wireshark.org/security/wnpa-sec-2026-14.html
reference_id wnpa-sec-2026-14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-30T12:51:10Z/
url https://www.wireshark.org/security/wnpa-sec-2026-14.html
fixed_packages
aliases CVE-2026-5402
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2de-ys7x-6qdp
4
url VCID-u4yz-db9x-kkck
vulnerability_id VCID-u4yz-db9x-kkck
summary DLMS/COSEM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6536
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://gitlab.com/wireshark/wireshark/-/issues/21065
reference_id 21065
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-30T12:45:55Z/
url https://gitlab.com/wireshark/wireshark/-/issues/21065
3
reference_url https://www.wireshark.org/security/wnpa-sec-2026-25.html
reference_id wnpa-sec-2026-25.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-30T12:45:55Z/
url https://www.wireshark.org/security/wnpa-sec-2026-25.html
fixed_packages
aliases CVE-2026-6536
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4yz-db9x-kkck
Fixing_vulnerabilities
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1