{"url":"http://public2.vulnerablecode.io/api/packages/122862?format=json","purl":"pkg:rpm/redhat/wireshark@1.8.10-7?arch=el6_5","type":"rpm","namespace":"redhat","name":"wireshark","version":"1.8.10-7","qualifiers":{"arch":"el6_5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57478?format=json","vulnerability_id":"VCID-422m-ens7-kuf9","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2283.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2283","reference_id":"","reference_type":"","scores":[{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87196","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.8722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.8724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.8728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0331","scoring_system":"epss","scoring_elements":"0.87289","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074111","reference_id":"1074111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074111"},{"reference_url":"https://security.gentoo.org/glsa/201406-33","reference_id":"GLSA-201406-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2014-2283"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-422m-ens7-kuf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86421?format=json","vulnerability_id":"VCID-99jf-ndmj-53h7","summary":"wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7112","reference_id":"","reference_type":"","scores":[{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77768","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.778","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77823","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044508","reference_id":"1044508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-7112"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-99jf-ndmj-53h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36849?format=json","vulnerability_id":"VCID-cbhd-57bb-v3cr","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6340","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026541","reference_id":"1026541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026541"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-6340"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbhd-57bb-v3cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36837?format=json","vulnerability_id":"VCID-db97-defr-7bg1","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6336","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026534","reference_id":"1026534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026534"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-6336"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-db97-defr-7bg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57479?format=json","vulnerability_id":"VCID-dmdz-e927-qkfb","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2299","reference_id":"","reference_type":"","scores":[{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.9859","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.986","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98603","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074109","reference_id":"1074109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074109"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb","reference_id":"CVE-2014-2299;OSVDB-104199","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb"},{"reference_url":"https://security.gentoo.org/glsa/201406-33","reference_id":"GLSA-201406-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2014-2299"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dmdz-e927-qkfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57477?format=json","vulnerability_id":"VCID-eh4p-xv7q-ruf2","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2281","reference_id":"","reference_type":"","scores":[{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.8682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86829","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.8685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86878","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074114","reference_id":"1074114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074114"},{"reference_url":"https://security.gentoo.org/glsa/201406-33","reference_id":"GLSA-201406-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2014-2281"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh4p-xv7q-ruf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36846?format=json","vulnerability_id":"VCID-mnmq-wyy5-bqbz","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6339","reference_id":"","reference_type":"","scores":[{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.7834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78355","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.7844","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026540","reference_id":"1026540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026540"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-6339"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnmq-wyy5-bqbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55966?format=json","vulnerability_id":"VCID-q61q-2nhp-23ad","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7114.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7114","reference_id":"","reference_type":"","scores":[{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76794","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76834","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.7685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00984","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044510","reference_id":"1044510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-7114"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q61q-2nhp-23ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36841?format=json","vulnerability_id":"VCID-ween-6fh8-gbcj","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6337","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50447","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026538","reference_id":"1026538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026538"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-6337"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ween-6fh8-gbcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36845?format=json","vulnerability_id":"VCID-xun3-ehkc-8bhx","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6338","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026539","reference_id":"1026539","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026539"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-6338"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xun3-ehkc-8bhx"}],"fixing_vulnerabilities":[],"risk_score":"1.9","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@1.8.10-7%3Farch=el6_5"}