{"url":"http://public2.vulnerablecode.io/api/packages/129511?format=json","purl":"pkg:rpm/redhat/wireshark@0.99.7-1?arch=el5","type":"rpm","namespace":"redhat","name":"wireshark","version":"0.99.7-1","qualifiers":{"arch":"el5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50423?format=json","vulnerability_id":"VCID-2spw-zse7-hbhp","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6112.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6112","reference_id":"","reference_type":"","scores":[{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397271","reference_id":"397271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6112"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2spw-zse7-hbhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50425?format=json","vulnerability_id":"VCID-32r3-83xu-mqes","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6114.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6114","reference_id":"","reference_type":"","scores":[{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88095","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03797","scoring_system":"epss","scoring_elements":"0.88115","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397291","reference_id":"397291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397291"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6114"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32r3-83xu-mqes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50424?format=json","vulnerability_id":"VCID-3jpd-pkma-3kh2","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6113.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6113","reference_id":"","reference_type":"","scores":[{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92406","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92437","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.9245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92464","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08646","scoring_system":"epss","scoring_elements":"0.92466","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397281","reference_id":"397281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397281"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/4347.pl","reference_id":"CVE-2007-6113","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/4347.pl"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6113"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jpd-pkma-3kh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50428?format=json","vulnerability_id":"VCID-6ssr-4yy5-5fgc","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6117.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6117.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6117","reference_id":"","reference_type":"","scores":[{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88406","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88462","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.8848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04017","scoring_system":"epss","scoring_elements":"0.88486","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397331","reference_id":"397331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397331"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6117"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ssr-4yy5-5fgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50427?format=json","vulnerability_id":"VCID-6xpz-2zwy-mfex","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6116.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6116","reference_id":"","reference_type":"","scores":[{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85347","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85356","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85396","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02505","scoring_system":"epss","scoring_elements":"0.85404","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397321","reference_id":"397321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397321"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6116"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xpz-2zwy-mfex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50437?format=json","vulnerability_id":"VCID-834c-auyq-xfhq","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6451.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6451","reference_id":"","reference_type":"","scores":[{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86595","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86605","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86664","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.8667","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03032","scoring_system":"epss","scoring_elements":"0.86696","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6451"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427254","reference_id":"427254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427254"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6451"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-834c-auyq-xfhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50435?format=json","vulnerability_id":"VCID-919g-9u5j-vfeb","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6441.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6441","reference_id":"","reference_type":"","scores":[{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77759","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77818","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77885","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427252","reference_id":"427252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427252"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6441"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-919g-9u5j-vfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50429?format=json","vulnerability_id":"VCID-dd3h-21v7-3qgu","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6118.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6118","reference_id":"","reference_type":"","scores":[{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89586","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0488","scoring_system":"epss","scoring_elements":"0.89602","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397341","reference_id":"397341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397341"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6118"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dd3h-21v7-3qgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50430?format=json","vulnerability_id":"VCID-f7p8-4hyh-skcv","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6119.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6119.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6119","reference_id":"","reference_type":"","scores":[{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87828","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.8787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87888","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87902","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87908","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03654","scoring_system":"epss","scoring_elements":"0.87906","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397351","reference_id":"397351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397351"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6119"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f7p8-4hyh-skcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50422?format=json","vulnerability_id":"VCID-ffwq-8kh4-v7h5","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6111.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6111","reference_id":"","reference_type":"","scores":[{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88345","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88432","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397251","reference_id":"397251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397251"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6111"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffwq-8kh4-v7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50433?format=json","vulnerability_id":"VCID-gww9-ekcz-4keg","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6438.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6438","reference_id":"","reference_type":"","scores":[{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427249","reference_id":"427249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427249"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6438"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gww9-ekcz-4keg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50426?format=json","vulnerability_id":"VCID-sjp1-2nsr-cbaa","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6115.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6115","reference_id":"","reference_type":"","scores":[{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89753","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89793","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05068","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397311","reference_id":"397311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397311"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6115"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjp1-2nsr-cbaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50436?format=json","vulnerability_id":"VCID-t62a-v83t-gqfy","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6450.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6450.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6450","reference_id":"","reference_type":"","scores":[{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427253","reference_id":"427253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427253"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6450"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t62a-v83t-gqfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50431?format=json","vulnerability_id":"VCID-ws2x-cjap-d7d8","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6120.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6120","reference_id":"","reference_type":"","scores":[{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03173","scoring_system":"epss","scoring_elements":"0.86986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397361","reference_id":"397361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6120"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2x-cjap-d7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50434?format=json","vulnerability_id":"VCID-xe3f-7egp-cyf5","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6439.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6439","reference_id":"","reference_type":"","scores":[{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.8007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80102","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80137","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80153","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=427251","reference_id":"427251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=427251"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"}],"fixed_packages":[],"aliases":["CVE-2007-6439"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xe3f-7egp-cyf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50432?format=json","vulnerability_id":"VCID-yrcp-vmnc-z3by","summary":"Multiple vulnerabilities have been discovered in Wireshark, allowing for\n    the remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6121.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6121","reference_id":"","reference_type":"","scores":[{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86204","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.8623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86227","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.8624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86237","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86259","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02848","scoring_system":"epss","scoring_elements":"0.86268","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=397371","reference_id":"397371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=397371"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381","reference_id":"452381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452381"},{"reference_url":"https://security.gentoo.org/glsa/200712-23","reference_id":"GLSA-200712-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0058","reference_id":"RHSA-2008:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0059","reference_id":"RHSA-2008:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0059"}],"fixed_packages":[],"aliases":["CVE-2007-6121"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yrcp-vmnc-z3by"}],"fixing_vulnerabilities":[],"risk_score":"0.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.7-1%3Farch=el5"}