Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/128029?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/128029?format=api", "purl": "pkg:rpm/redhat/wireshark@1.0.11-1.el4_8?arch=5", "type": "rpm", "namespace": "redhat", "name": "wireshark", "version": "1.0.11-1.el4_8", "qualifiers": { "arch": "5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38445?format=api", "vulnerability_id": "VCID-a93v-wvpc-aya5", "summary": "Multiple vulnerabilities have been discovered in Wireshark which allow for\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2562.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2562.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2562", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.8294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.82956", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.82968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.82965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.8299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.82998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83013", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83007", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83042", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83067", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83075", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01851", "scoring_system": "epss", "scoring_elements": "0.83082", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=512987", "reference_id": "512987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512987" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237", "reference_id": "538237", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237" }, { "reference_url": "https://security.gentoo.org/glsa/200909-16", "reference_id": "GLSA-200909-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200909-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-2562" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a93v-wvpc-aya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38446?format=api", "vulnerability_id": "VCID-afv4-xmfn-57e5", "summary": "Multiple vulnerabilities have been discovered in Wireshark which allow for\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2563.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79814", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79873", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79876", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79878", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.7988", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79909", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01317", "scoring_system": "epss", "scoring_elements": "0.79933", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=512992", "reference_id": "512992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512992" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237", "reference_id": "538237", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237" }, { "reference_url": "https://security.gentoo.org/glsa/200909-16", "reference_id": "GLSA-200909-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200909-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-2563" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afv4-xmfn-57e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56498?format=api", "vulnerability_id": "VCID-bshu-54kw-j7hn", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3550.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3550.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82501", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82527", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82537", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01733", "scoring_system": "epss", "scoring_elements": "0.82541", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=531260", "reference_id": "531260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531260" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-3550" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bshu-54kw-j7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87912?format=api", "vulnerability_id": "VCID-g64r-2spc-13dq", "summary": "wireshark: crash in LWRES dissector", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0304.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98849", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98851", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98854", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98857", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98858", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98859", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98862", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98864", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98868", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.74714", "scoring_system": "epss", "scoring_elements": "0.98871", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=559793", "reference_id": "559793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559793" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16289.rb", "reference_id": "CVE-2010-0304;OSVDB-61987", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16289.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/11288.py", "reference_id": "CVE-2010-0304;OSVDB-61987", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/11288.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16292.rb", "reference_id": "CVE-2010-0304;OSVDB-61987", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16292.rb" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0304" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g64r-2spc-13dq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38443?format=api", "vulnerability_id": "VCID-k59u-tnkh-yqa1", "summary": "Multiple vulnerabilities have been discovered in Wireshark which allow for\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2560.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2560.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2560", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85791", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85809", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85814", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85855", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.8587", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85889", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85897", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02685", "scoring_system": "epss", "scoring_elements": "0.85899", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=513008", "reference_id": "513008", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513008" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237", "reference_id": "538237", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538237" }, { "reference_url": "https://security.gentoo.org/glsa/200909-16", "reference_id": "GLSA-200909-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200909-16" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-2560" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k59u-tnkh-yqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42205?format=api", "vulnerability_id": "VCID-mabx-abz3-qbgb", "summary": "Multiple vulnerabilities were found in Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4377.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4377.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.8114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81191", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81233", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81234", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81255", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81262", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0151", "scoring_system": "epss", "scoring_elements": "0.81268", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=549578", "reference_id": "549578", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=549578" }, { "reference_url": "https://security.gentoo.org/glsa/201006-05", "reference_id": "GLSA-201006-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4377" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mabx-abz3-qbgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56501?format=api", "vulnerability_id": "VCID-ubvy-r1n3-z7c8", "summary": "Multiple vulnerabilities have been discovered in Wireshark, allowing for\n the remote execution of arbitrary code, or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90267", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.9028", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90285", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.903", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90308", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90337", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05591", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=532479", "reference_id": "532479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532479" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583", "reference_id": "553583", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553583" }, { "reference_url": "https://security.gentoo.org/glsa/200911-05", "reference_id": "GLSA-200911-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200911-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0360", "reference_id": "RHSA-2010:0360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0360" } ], "fixed_packages": [], "aliases": [ "CVE-2009-3829" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubvy-r1n3-z7c8" } ], "fixing_vulnerabilities": [], "risk_score": "1.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@1.0.11-1.el4_8%3Farch=5" }