{"url":"http://public2.vulnerablecode.io/api/packages/122863?format=json","purl":"pkg:rpm/redhat/wireshark@1.0.15-6?arch=el5_10","type":"rpm","namespace":"redhat","name":"wireshark","version":"1.0.15-6","qualifiers":{"arch":"el5_10"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36833?format=json","vulnerability_id":"VCID-2ty4-6e2b-rkbs","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5721","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52023","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007197","reference_id":"1007197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007197"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-5721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ty4-6e2b-rkbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49023?format=json","vulnerability_id":"VCID-3dcx-c9yp-r7ae","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4932.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4932","reference_id":"","reference_type":"","scores":[{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81225","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990172","reference_id":"990172","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990172"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4932"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3dcx-c9yp-r7ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49026?format=json","vulnerability_id":"VCID-7eac-g81q-w3fk","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4935.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4935","reference_id":"","reference_type":"","scores":[{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.8066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80766","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990179","reference_id":"990179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990179"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4935"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7eac-g81q-w3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86421?format=json","vulnerability_id":"VCID-99jf-ndmj-53h7","summary":"wireshark: SIP dissector could go into an infinite loop (wnpa-sec-2013-66)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7112","reference_id":"","reference_type":"","scores":[{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77678","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77768","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.778","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77823","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044508","reference_id":"1044508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1044508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2013-7112"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-99jf-ndmj-53h7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86894?format=json","vulnerability_id":"VCID-bjwk-j2vj-bqhz","summary":"wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5600.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881742","reference_id":"881742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881742"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5600","reference_id":"CVE-2012-5600","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-5600"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjwk-j2vj-bqhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57479?format=json","vulnerability_id":"VCID-dmdz-e927-qkfb","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2299","reference_id":"","reference_type":"","scores":[{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.9859","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98596","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.986","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67962","scoring_system":"epss","scoring_elements":"0.98603","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074109","reference_id":"1074109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074109"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb","reference_id":"CVE-2014-2299;OSVDB-104199","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/33069.rb"},{"reference_url":"https://security.gentoo.org/glsa/201406-33","reference_id":"GLSA-201406-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2014-2299"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dmdz-e927-qkfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86897?format=json","vulnerability_id":"VCID-ef43-tgs4-1yh1","summary":"wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-wtp.c?r1=45614&r2=45613&pathrev=45614","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-wtp.c?r1=45614&r2=45613&pathrev=45614"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45614","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45614"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6061.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6061","reference_id":"","reference_type":"","scores":[{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72473","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72363","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72427","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72437","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72425","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00717","scoring_system":"epss","scoring_elements":"0.72476","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6061"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7869","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15253","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15253"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2012-37.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2012-37.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881748","reference_id":"881748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881748"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6061","reference_id":"CVE-2012-6061","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-6061"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ef43-tgs4-1yh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49022?format=json","vulnerability_id":"VCID-eggc-7w1n-u7cb","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4931.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4931.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4931","reference_id":"","reference_type":"","scores":[{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81225","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990170","reference_id":"990170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990170"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4931"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eggc-7w1n-u7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57477?format=json","vulnerability_id":"VCID-eh4p-xv7q-ruf2","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2281","reference_id":"","reference_type":"","scores":[{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.8682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86829","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.8685","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03117","scoring_system":"epss","scoring_elements":"0.86878","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074114","reference_id":"1074114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074114"},{"reference_url":"https://security.gentoo.org/glsa/201406-33","reference_id":"GLSA-201406-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[],"aliases":["CVE-2014-2281"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh4p-xv7q-ruf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49018?format=json","vulnerability_id":"VCID-ezkv-2u84-5fcc","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4927.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4927","reference_id":"","reference_type":"","scores":[{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82797","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82811","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82806","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82849","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.8292","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990166","reference_id":"990166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990166"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4927"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezkv-2u84-5fcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86904?format=json","vulnerability_id":"VCID-f9h3-amnj-uqgf","summary":"wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5595.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5595.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881809","reference_id":"881809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881809"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5595","reference_id":"CVE-2012-5595","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5595"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-5595"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9h3-amnj-uqgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86896?format=json","vulnerability_id":"VCID-gtrt-c262-hffk","summary":"wireshark: DoS (infinite loop) in the WTP dissector (wnpa-sec-2012-37)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5599.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5599.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881748","reference_id":"881748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881748"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5599","reference_id":"CVE-2012-5599","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-5599"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gtrt-c262-hffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49025?format=json","vulnerability_id":"VCID-k7xv-4ugq-5qfz","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4934.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4934","reference_id":"","reference_type":"","scores":[{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.8066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80766","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990178","reference_id":"990178","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990178"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4934"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k7xv-4ugq-5qfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49024?format=json","vulnerability_id":"VCID-mqdg-6srp-huc4","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4933.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4933","reference_id":"","reference_type":"","scores":[{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01503","scoring_system":"epss","scoring_elements":"0.81225","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=990175","reference_id":"990175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=990175"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4933"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqdg-6srp-huc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49010?format=json","vulnerability_id":"VCID-n8fe-ywyv-xyg6","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802&r2=49801&pathrev=49802","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802&r2=49801&pathrev=49802"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=49802","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=49802"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4083.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4083","reference_id":"","reference_type":"","scores":[{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69142","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.6921","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00591","scoring_system":"epss","scoring_elements":"0.69294","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4083"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083"},{"reference_url":"http://secunia.com/advisories/53762","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53762"},{"reference_url":"http://secunia.com/advisories/54296","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54296"},{"reference_url":"http://secunia.com/advisories/54425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54425"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375"},{"reference_url":"http://www.debian.org/security/2013/dsa-2709","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2709"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172"},{"reference_url":"http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html"},{"reference_url":"http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html"},{"reference_url":"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2013-41.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2013-41.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918","reference_id":"711918","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=972688","reference_id":"972688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=972688"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4083","reference_id":"CVE-2013-4083","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4083"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4083"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n8fe-ywyv-xyg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48995?format=json","vulnerability_id":"VCID-nam2-wj6p-87fq","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ber.c?r1=48944&r2=48943&pathrev=48944","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ber.c?r1=48944&r2=48943&pathrev=48944"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=48944","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=48944"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3557.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3557.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3557","reference_id":"","reference_type":"","scores":[{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.8865","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88676","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88719","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.8873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0418","scoring_system":"epss","scoring_elements":"0.88736","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3557"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562"},{"reference_url":"http://secunia.com/advisories/53425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53425"},{"reference_url":"http://secunia.com/advisories/54425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54425"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16521","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16521"},{"reference_url":"https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.wireshark.org/docs/relnotes/wireshark-1.6.15.html"},{"reference_url":"http://www.debian.org/security/2013/dsa-2700","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2700"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2013-25.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2013-25.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167","reference_id":"709167","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=965193","reference_id":"965193","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=965193"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3557","reference_id":"CVE-2013-3557","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3557"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-3557"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nam2-wj6p-87fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86905?format=json","vulnerability_id":"VCID-r7hg-4pg7-tyfa","summary":"wireshark: DoS (infinite loop) in the SCTP dissector (wnpa-sec-2012-33)","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sctp.c?r1=45355&r2=45354&pathrev=45355","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sctp.c?r1=45355&r2=45354&pathrev=45355"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45355","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45355"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6056.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6056","reference_id":"","reference_type":"","scores":[{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72786","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72934","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6056"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7802","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16139","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16139"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2012-33.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2012-33.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881809","reference_id":"881809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881809"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6056","reference_id":"CVE-2012-6056","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-6056"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7hg-4pg7-tyfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49008?format=json","vulnerability_id":"VCID-sxdq-ncw8-b3fh","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623&r2=49622&pathrev=49623"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=49623"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4081.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4081","reference_id":"","reference_type":"","scores":[{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.7638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76384","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76444","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76469","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.7651","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4081"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083"},{"reference_url":"http://secunia.com/advisories/53762","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53762"},{"reference_url":"http://secunia.com/advisories/54425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54425"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820"},{"reference_url":"http://www.debian.org/security/2013/dsa-2709","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2709"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:172"},{"reference_url":"http://www.securityfocus.com/bid/60505","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/60505"},{"reference_url":"http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html"},{"reference_url":"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2013-39.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2013-39.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918","reference_id":"711918","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711918"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=972686","reference_id":"972686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=972686"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4081","reference_id":"CVE-2013-4081","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4081"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-4081"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxdq-ncw8-b3fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48997?format=json","vulnerability_id":"VCID-thuh-cnf3-a3ab","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=48644&r2=48643&pathrev=48644"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=48644"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3559.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3559","reference_id":"","reference_type":"","scores":[{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89717","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89731","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89764","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89772","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05039","scoring_system":"epss","scoring_elements":"0.89781","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3559"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8231"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8540"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562"},{"reference_url":"http://secunia.com/advisories/53425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53425"},{"reference_url":"http://secunia.com/advisories/54425","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54425"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16228"},{"reference_url":"http://www.debian.org/security/2013/dsa-2700","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2700"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2013-27.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2013-27.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167","reference_id":"709167","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709167"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=965190","reference_id":"965190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=965190"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3559","reference_id":"CVE-2013-3559","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-3559"},{"reference_url":"https://security.gentoo.org/glsa/201308-05","reference_id":"GLSA-201308-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2013-3559"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thuh-cnf3-a3ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86899?format=json","vulnerability_id":"VCID-uxfu-4j6w-qudu","summary":"wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-iscsi.c?r1=45524&r2=45523&pathrev=45524","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-iscsi.c?r1=45524&r2=45523&pathrev=45524"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45524","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45524"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6060.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6060","reference_id":"","reference_type":"","scores":[{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72786","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.7288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00738","scoring_system":"epss","scoring_elements":"0.72934","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6060"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7858","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16038","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16038"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2012-36.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2012-36.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881771","reference_id":"881771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6060","reference_id":"CVE-2012-6060","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-6060"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uxfu-4j6w-qudu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86898?format=json","vulnerability_id":"VCID-vbts-9zvs-d3fm","summary":"wireshark: DoS (infinite loop) in the iSCSI dissector (wnpa-sec-2012-36)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5598.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5598.json"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881771","reference_id":"881771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881771"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5598","reference_id":"CVE-2012-5598","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-5598"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbts-9zvs-d3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86895?format=json","vulnerability_id":"VCID-zszc-e2kn-3yhn","summary":"wireshark: DoS (infinite loop) in the RTCP dissector (wnpa-sec-2012-38)","references":[{"reference_url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtcp.c?r1=45717&r2=45716&pathrev=45717","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtcp.c?r1=45717&r2=45716&pathrev=45717"},{"reference_url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45717","reference_id":"","reference_type":"","scores":[],"url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=45717"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0341.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6062.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6062","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50664","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50721","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50751","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.507","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50709","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6062"},{"reference_url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7879","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15894","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15894"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2012-38.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.wireshark.org/security/wnpa-sec-2012-38.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=881742","reference_id":"881742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=881742"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6062","reference_id":"CVE-2012-6062","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[],"aliases":["CVE-2012-6062"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zszc-e2kn-3yhn"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@1.0.15-6%3Farch=el5_10"}