Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122863?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122863?format=api", "purl": "pkg:rpm/redhat/wireshark@1.0.15-6?arch=el5_10", "type": "rpm", "namespace": "redhat", "name": "wireshark", "version": "1.0.15-6", "qualifiers": { "arch": "el5_10" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36833?format=api", "vulnerability_id": "VCID-2ty4-6e2b-rkbs", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.5201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52113", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52097", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52081", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52121", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.5206", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52023", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197", "reference_id": "1007197", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5721" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ty4-6e2b-rkbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49023?format=api", "vulnerability_id": "VCID-3dcx-c9yp-r7ae", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4932.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4932.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4932", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.8112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81212", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81219", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81225", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172", "reference_id": "990172", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990172" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4932" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3dcx-c9yp-r7ae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49026?format=api", "vulnerability_id": "VCID-7eac-g81q-w3fk", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4935.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4935.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4935", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.8066", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80723", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80752", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80766", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179", "reference_id": "990179", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990179" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4935" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7eac-g81q-w3fk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86421?format=api", "vulnerability_id": "VCID-99jf-ndmj-53h7", "summary": "wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77678", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77755", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77739", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77768", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.778", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77809", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01071", "scoring_system": "epss", "scoring_elements": "0.77823", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508", "reference_id": "1044508", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [], "aliases": [ "CVE-2013-7112" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99jf-ndmj-53h7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86894?format=api", "vulnerability_id": "VCID-bjwk-j2vj-bqhz", "summary": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5600.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5600.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742", "reference_id": "881742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600", "reference_id": "CVE-2012-5600", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-5600" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjwk-j2vj-bqhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57479?format=api", "vulnerability_id": "VCID-dmdz-e927-qkfb", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.9859", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98597", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98596", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.986", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98601", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.67962", "scoring_system": "epss", "scoring_elements": "0.98603", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109", "reference_id": "1074109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074109" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb", "reference_id": "CVE-2014-2299;OSVDB-104199", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201406-33", "reference_id": "GLSA-201406-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2299" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmdz-e927-qkfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86897?format=api", "vulnerability_id": "VCID-ef43-tgs4-1yh1", "summary": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-wtp.c?r1=45614&r2=45613&pathrev=45614", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-wtp.c?r1=45614&r2=45613&pathrev=45614" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45614", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45614" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6061.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72339", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72363", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.7238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72392", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72415", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72437", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72476", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6061" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7869", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7869" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15253" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2012-37.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2012-37.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748", "reference_id": "881748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061", "reference_id": "CVE-2012-6061", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6061" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ef43-tgs4-1yh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49022?format=api", "vulnerability_id": "VCID-eggc-7w1n-u7cb", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4931.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4931.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4931", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.8112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81212", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81219", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81225", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170", "reference_id": "990170", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990170" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4931" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eggc-7w1n-u7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57477?format=api", "vulnerability_id": "VCID-eh4p-xv7q-ruf2", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2281", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.8682", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86834", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.8685", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86854", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86855", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03117", "scoring_system": "epss", "scoring_elements": "0.86878", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114", "reference_id": "1074114", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074114" }, { "reference_url": "https://security.gentoo.org/glsa/201406-33", "reference_id": "GLSA-201406-33", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [], "aliases": [ "CVE-2014-2281" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eh4p-xv7q-ruf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49018?format=api", "vulnerability_id": "VCID-ezkv-2u84-5fcc", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4927.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4927.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4927", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82781", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82797", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82811", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82806", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82837", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82853", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82849", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82845", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.82916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01815", "scoring_system": "epss", "scoring_elements": "0.8292", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166", "reference_id": "990166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990166" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4927" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezkv-2u84-5fcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86904?format=api", "vulnerability_id": "VCID-f9h3-amnj-uqgf", "summary": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5595.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5595.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809", "reference_id": "881809", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595", "reference_id": "CVE-2012-5595", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-5595" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9h3-amnj-uqgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86896?format=api", "vulnerability_id": "VCID-gtrt-c262-hffk", "summary": "wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5599.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5599.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748", "reference_id": "881748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881748" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599", "reference_id": "CVE-2012-5599", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-5599" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtrt-c262-hffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49025?format=api", "vulnerability_id": "VCID-k7xv-4ugq-5qfz", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4934.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4934.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4934", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.8066", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80688", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80723", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80752", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80766", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178", "reference_id": "990178", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990178" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4934" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k7xv-4ugq-5qfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49024?format=api", "vulnerability_id": "VCID-mqdg-6srp-huc4", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4933.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4933.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.8112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81212", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81219", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01503", "scoring_system": "epss", "scoring_elements": "0.81225", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175", "reference_id": "990175", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=990175" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4933" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqdg-6srp-huc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49010?format=api", "vulnerability_id": "VCID-n8fe-ywyv-xyg6", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802&r2=49801&pathrev=49802", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802&r2=49801&pathrev=49802" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49802", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49802" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4083.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4083.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.6916", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.6921", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69247", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69235", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69285", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00591", "scoring_system": "epss", "scoring_elements": "0.69294", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4083" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" }, { "reference_url": "http://secunia.com/advisories/53762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53762" }, { "reference_url": "http://secunia.com/advisories/54296", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54296" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "reference_url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "reference_url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "reference_url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918", "reference_id": "711918", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688", "reference_id": "972688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972688" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083", "reference_id": "CVE-2013-4083", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4083" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4083" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8fe-ywyv-xyg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48995?format=api", "vulnerability_id": "VCID-nam2-wj6p-87fq", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ber.c?r1=48944&r2=48943&pathrev=48944", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ber.c?r1=48944&r2=48943&pathrev=48944" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48944", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48944" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3557.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3557.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3557", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88735", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.8865", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.887", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88712", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88719", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88715", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.8873", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0418", "scoring_system": "epss", "scoring_elements": "0.88736", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3557" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" }, { "reference_url": "http://secunia.com/advisories/53425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53425" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16521" }, { "reference_url": "https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2700", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2700" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-25.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-25.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167", "reference_id": "709167", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193", "reference_id": "965193", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965193" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557", "reference_id": "CVE-2013-3557", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3557" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-3557" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nam2-wj6p-87fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86905?format=api", "vulnerability_id": "VCID-r7hg-4pg7-tyfa", "summary": "wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sctp.c?r1=45355&r2=45354&pathrev=45355", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sctp.c?r1=45355&r2=45354&pathrev=45355" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45355", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45355" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6056.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72931", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72783", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72786", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72924", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72934", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6056" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16139", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16139" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2012-33.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2012-33.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809", "reference_id": "881809", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881809" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056", "reference_id": "CVE-2012-6056", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6056" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7hg-4pg7-tyfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49008?format=api", "vulnerability_id": "VCID-sxdq-ncw8-b3fh", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4081.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4081.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4081", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76523", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.7638", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76384", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76441", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76466", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76444", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76483", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.76504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00957", "scoring_system": "epss", "scoring_elements": "0.7651", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4081" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" }, { "reference_url": "http://secunia.com/advisories/53762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53762" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "reference_url": "http://www.securityfocus.com/bid/60505", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/60505" }, { "reference_url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "reference_url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918", "reference_id": "711918", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686", "reference_id": "972686", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972686" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081", "reference_id": "CVE-2013-4081", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4081" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4081" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sxdq-ncw8-b3fh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48997?format=api", "vulnerability_id": "VCID-thuh-cnf3-a3ab", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3559.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89714", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89731", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89733", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89751", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89757", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89764", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89772", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89767", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05039", "scoring_system": "epss", "scoring_elements": "0.89781", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3559" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" }, { "reference_url": "http://secunia.com/advisories/53425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53425" }, { "reference_url": "http://secunia.com/advisories/54425", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/54425" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2700", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2700" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2013-27.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2013-27.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167", "reference_id": "709167", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190", "reference_id": "965190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965190" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559", "reference_id": "CVE-2013-3559", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3559" }, { "reference_url": "https://security.gentoo.org/glsa/201308-05", "reference_id": "GLSA-201308-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2013-3559" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-thuh-cnf3-a3ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86899?format=api", "vulnerability_id": "VCID-uxfu-4j6w-qudu", "summary": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-iscsi.c?r1=45524&r2=45523&pathrev=45524", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-iscsi.c?r1=45524&r2=45523&pathrev=45524" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45524", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45524" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6060.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72931", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72783", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7281", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72786", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.7288", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72882", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72924", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00738", "scoring_system": "epss", "scoring_elements": "0.72934", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6060" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16038" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2012-36.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2012-36.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771", "reference_id": "881771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060", "reference_id": "CVE-2012-6060", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6060" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxfu-4j6w-qudu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86898?format=api", "vulnerability_id": "VCID-vbts-9zvs-d3fm", "summary": "wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5598.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5598.json" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771", "reference_id": "881771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881771" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598", "reference_id": "CVE-2012-5598", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-5598" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbts-9zvs-d3fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86895?format=api", "vulnerability_id": "VCID-zszc-e2kn-3yhn", "summary": "wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)", "references": [ { "reference_url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtcp.c?r1=45717&r2=45716&pathrev=45717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtcp.c?r1=45717&r2=45716&pathrev=45717" }, { "reference_url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=45717" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6062.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6062.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6062", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50664", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.5067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50721", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.5074", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50751", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.507", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50709", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6062" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15894" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2012-38.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2012-38.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742", "reference_id": "881742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881742" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062", "reference_id": "CVE-2012-6062", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6062" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zszc-e2kn-3yhn" } ], "fixing_vulnerabilities": [], "risk_score": "2.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@1.0.15-6%3Farch=el5_10" }