Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
Typeapk
Namespacealpine
Namewireshark
Version2.2.15-r0
Qualifiers
arch armhf
distroversion v3.6
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1her-1nh5-57cx
vulnerability_id VCID-1her-1nh5-57cx
summary wireshark: SIGCOMP dissector crash in packet-sigcomp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7418
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
13
value 0.01005
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-26T12:55:00Z
14
value 0.01005
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-29T12:55:00Z
15
value 0.01005
scoring_system epss
scoring_elements 0.77132
published_at 2026-05-05T12:55:00Z
16
value 0.01005
scoring_system epss
scoring_elements 0.77162
published_at 2026-05-07T12:55:00Z
17
value 0.01005
scoring_system epss
scoring_elements 0.77183
published_at 2026-05-09T12:55:00Z
18
value 0.01005
scoring_system epss
scoring_elements 0.77172
published_at 2026-05-11T12:55:00Z
19
value 0.01005
scoring_system epss
scoring_elements 0.77188
published_at 2026-05-12T12:55:00Z
20
value 0.01005
scoring_system epss
scoring_elements 0.77237
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7418
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549305
reference_id 1549305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549305
5
reference_url https://access.redhat.com/errata/RHSA-2020:1047
reference_id RHSA-2020:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1047
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7418
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx
1
url VCID-1ndt-2ndw-mug2
vulnerability_id VCID-1ndt-2ndw-mug2
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7323
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67716
published_at 2026-05-14T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-05-05T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
13
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
14
value 0.00538
scoring_system epss
scoring_elements 0.67603
published_at 2026-04-26T12:55:00Z
15
value 0.00538
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-29T12:55:00Z
16
value 0.00538
scoring_system epss
scoring_elements 0.67623
published_at 2026-05-07T12:55:00Z
17
value 0.00538
scoring_system epss
scoring_elements 0.6766
published_at 2026-05-09T12:55:00Z
18
value 0.00538
scoring_system epss
scoring_elements 0.67631
published_at 2026-05-11T12:55:00Z
19
value 0.00538
scoring_system epss
scoring_elements 0.67656
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7323
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2
2
url VCID-6u5q-6d7a-ekd3
vulnerability_id VCID-6u5q-6d7a-ekd3
summary wireshark: Uncontrolled Resource Consumption in epan/tvbuff.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11357.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11357
reference_id
reference_type
scores
0
value 0.01179
scoring_system epss
scoring_elements 0.78689
published_at 2026-04-01T12:55:00Z
1
value 0.01179
scoring_system epss
scoring_elements 0.78925
published_at 2026-05-14T12:55:00Z
2
value 0.01179
scoring_system epss
scoring_elements 0.78857
published_at 2026-05-07T12:55:00Z
3
value 0.01179
scoring_system epss
scoring_elements 0.78872
published_at 2026-05-09T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.78868
published_at 2026-05-11T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78886
published_at 2026-05-12T12:55:00Z
6
value 0.01179
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-02T12:55:00Z
7
value 0.01179
scoring_system epss
scoring_elements 0.78726
published_at 2026-04-04T12:55:00Z
8
value 0.01179
scoring_system epss
scoring_elements 0.78708
published_at 2026-04-07T12:55:00Z
9
value 0.01179
scoring_system epss
scoring_elements 0.78733
published_at 2026-04-08T12:55:00Z
10
value 0.01179
scoring_system epss
scoring_elements 0.7874
published_at 2026-04-09T12:55:00Z
11
value 0.01179
scoring_system epss
scoring_elements 0.78765
published_at 2026-04-18T12:55:00Z
12
value 0.01179
scoring_system epss
scoring_elements 0.78747
published_at 2026-04-12T12:55:00Z
13
value 0.01179
scoring_system epss
scoring_elements 0.78738
published_at 2026-04-13T12:55:00Z
14
value 0.01179
scoring_system epss
scoring_elements 0.78767
published_at 2026-04-16T12:55:00Z
15
value 0.01179
scoring_system epss
scoring_elements 0.78761
published_at 2026-04-21T12:55:00Z
16
value 0.01179
scoring_system epss
scoring_elements 0.78789
published_at 2026-04-24T12:55:00Z
17
value 0.01179
scoring_system epss
scoring_elements 0.78796
published_at 2026-04-26T12:55:00Z
18
value 0.01179
scoring_system epss
scoring_elements 0.78814
published_at 2026-04-29T12:55:00Z
19
value 0.01179
scoring_system epss
scoring_elements 0.78834
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11357
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2018-28.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-28.html
9
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
10
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581771
reference_id 1581771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581771
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
13
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
14
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
15
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11357
reference_id CVE-2018-11357
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11357
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11357
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u5q-6d7a-ekd3
3
url VCID-99mf-vasd-6qfa
vulnerability_id VCID-99mf-vasd-6qfa
summary wireshark: Heap-based Buffer Overflow in packet-gsm_a_dtap.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11360.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11360
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-01T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.78127
published_at 2026-05-14T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.78058
published_at 2026-05-07T12:55:00Z
3
value 0.0109
scoring_system epss
scoring_elements 0.78074
published_at 2026-05-09T12:55:00Z
4
value 0.0109
scoring_system epss
scoring_elements 0.78066
published_at 2026-05-11T12:55:00Z
5
value 0.0109
scoring_system epss
scoring_elements 0.78083
published_at 2026-05-12T12:55:00Z
6
value 0.0109
scoring_system epss
scoring_elements 0.77889
published_at 2026-04-02T12:55:00Z
7
value 0.0109
scoring_system epss
scoring_elements 0.77917
published_at 2026-04-04T12:55:00Z
8
value 0.0109
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-07T12:55:00Z
9
value 0.0109
scoring_system epss
scoring_elements 0.77927
published_at 2026-04-08T12:55:00Z
10
value 0.0109
scoring_system epss
scoring_elements 0.7793
published_at 2026-04-09T12:55:00Z
11
value 0.0109
scoring_system epss
scoring_elements 0.77957
published_at 2026-04-11T12:55:00Z
12
value 0.0109
scoring_system epss
scoring_elements 0.77941
published_at 2026-04-13T12:55:00Z
13
value 0.0109
scoring_system epss
scoring_elements 0.77976
published_at 2026-04-16T12:55:00Z
14
value 0.0109
scoring_system epss
scoring_elements 0.77975
published_at 2026-04-18T12:55:00Z
15
value 0.0109
scoring_system epss
scoring_elements 0.77968
published_at 2026-04-21T12:55:00Z
16
value 0.0109
scoring_system epss
scoring_elements 0.78001
published_at 2026-04-24T12:55:00Z
17
value 0.0109
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-26T12:55:00Z
18
value 0.0109
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-29T12:55:00Z
19
value 0.0109
scoring_system epss
scoring_elements 0.78031
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11360
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.debian.org/security/2018/dsa-4217
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4217
8
reference_url https://www.wireshark.org/security/wnpa-sec-2018-30.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-30.html
9
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
10
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581781
reference_id 1581781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581781
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
13
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
14
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
15
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11360
reference_id CVE-2018-11360
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11360
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11360
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-99mf-vasd-6qfa
4
url VCID-9g71-v5zu-tqg3
vulnerability_id VCID-9g71-v5zu-tqg3
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7329
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57918
published_at 2026-05-14T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
12
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
13
value 0.00355
scoring_system epss
scoring_elements 0.57831
published_at 2026-04-26T12:55:00Z
14
value 0.00355
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-29T12:55:00Z
15
value 0.00355
scoring_system epss
scoring_elements 0.57768
published_at 2026-05-05T12:55:00Z
16
value 0.00355
scoring_system epss
scoring_elements 0.57812
published_at 2026-05-07T12:55:00Z
17
value 0.00355
scoring_system epss
scoring_elements 0.57874
published_at 2026-05-09T12:55:00Z
18
value 0.00355
scoring_system epss
scoring_elements 0.57822
published_at 2026-05-11T12:55:00Z
19
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7329
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7329
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3
5
url VCID-9xr3-ty4u-ekeh
vulnerability_id VCID-9xr3-ty4u-ekeh
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7330
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57918
published_at 2026-05-14T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
12
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
13
value 0.00355
scoring_system epss
scoring_elements 0.57831
published_at 2026-04-26T12:55:00Z
14
value 0.00355
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-29T12:55:00Z
15
value 0.00355
scoring_system epss
scoring_elements 0.57768
published_at 2026-05-05T12:55:00Z
16
value 0.00355
scoring_system epss
scoring_elements 0.57812
published_at 2026-05-07T12:55:00Z
17
value 0.00355
scoring_system epss
scoring_elements 0.57874
published_at 2026-05-09T12:55:00Z
18
value 0.00355
scoring_system epss
scoring_elements 0.57822
published_at 2026-05-11T12:55:00Z
19
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7330
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7330
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh
6
url VCID-a6fx-tsy1-tuc1
vulnerability_id VCID-a6fx-tsy1-tuc1
summary wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7320
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71951
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.7197
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71997
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72021
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72005
published_at 2026-04-12T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71989
published_at 2026-04-13T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.7203
published_at 2026-04-16T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72038
published_at 2026-04-18T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-21T12:55:00Z
12
value 0.007
scoring_system epss
scoring_elements 0.72067
published_at 2026-04-29T12:55:00Z
13
value 0.007
scoring_system epss
scoring_elements 0.72073
published_at 2026-04-26T12:55:00Z
14
value 0.007
scoring_system epss
scoring_elements 0.7206
published_at 2026-05-05T12:55:00Z
15
value 0.007
scoring_system epss
scoring_elements 0.72092
published_at 2026-05-07T12:55:00Z
16
value 0.007
scoring_system epss
scoring_elements 0.72119
published_at 2026-05-09T12:55:00Z
17
value 0.007
scoring_system epss
scoring_elements 0.72082
published_at 2026-05-11T12:55:00Z
18
value 0.007
scoring_system epss
scoring_elements 0.72109
published_at 2026-05-12T12:55:00Z
19
value 0.007
scoring_system epss
scoring_elements 0.72167
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7320
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549277
reference_id 1549277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549277
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7320
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1
7
url VCID-ap24-btqx-j7eb
vulnerability_id VCID-ap24-btqx-j7eb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7334
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
13
value 0.01005
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-26T12:55:00Z
14
value 0.01005
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-29T12:55:00Z
15
value 0.01005
scoring_system epss
scoring_elements 0.77132
published_at 2026-05-05T12:55:00Z
16
value 0.01005
scoring_system epss
scoring_elements 0.77162
published_at 2026-05-07T12:55:00Z
17
value 0.01005
scoring_system epss
scoring_elements 0.77183
published_at 2026-05-09T12:55:00Z
18
value 0.01005
scoring_system epss
scoring_elements 0.77172
published_at 2026-05-11T12:55:00Z
19
value 0.01005
scoring_system epss
scoring_elements 0.77188
published_at 2026-05-12T12:55:00Z
20
value 0.01005
scoring_system epss
scoring_elements 0.77237
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7334
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549255
reference_id 1549255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549255
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7334
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb
8
url VCID-ardp-y1tu-t7fb
vulnerability_id VCID-ardp-y1tu-t7fb
summary wireshark: IPMI dissector crash in packet-ipmi-picmg.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7417
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60658
published_at 2026-04-01T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60731
published_at 2026-04-02T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-04T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60726
published_at 2026-04-07T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60774
published_at 2026-04-08T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.6079
published_at 2026-04-09T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60811
published_at 2026-04-11T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60797
published_at 2026-04-12T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60779
published_at 2026-04-13T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60821
published_at 2026-04-16T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.60827
published_at 2026-04-18T12:55:00Z
11
value 0.00401
scoring_system epss
scoring_elements 0.60812
published_at 2026-04-21T12:55:00Z
12
value 0.00401
scoring_system epss
scoring_elements 0.608
published_at 2026-04-24T12:55:00Z
13
value 0.00401
scoring_system epss
scoring_elements 0.60814
published_at 2026-04-26T12:55:00Z
14
value 0.00401
scoring_system epss
scoring_elements 0.60806
published_at 2026-04-29T12:55:00Z
15
value 0.00401
scoring_system epss
scoring_elements 0.60757
published_at 2026-05-05T12:55:00Z
16
value 0.00401
scoring_system epss
scoring_elements 0.60805
published_at 2026-05-07T12:55:00Z
17
value 0.00401
scoring_system epss
scoring_elements 0.60862
published_at 2026-05-09T12:55:00Z
18
value 0.00401
scoring_system epss
scoring_elements 0.60824
published_at 2026-05-11T12:55:00Z
19
value 0.00401
scoring_system epss
scoring_elements 0.6085
published_at 2026-05-12T12:55:00Z
20
value 0.00401
scoring_system epss
scoring_elements 0.60908
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549301
reference_id 1549301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549301
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7417
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb
9
url VCID-bhf2-h1h2-tybb
vulnerability_id VCID-bhf2-h1h2-tybb
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7331
reference_id
reference_type
scores
0
value 0.01301
scoring_system epss
scoring_elements 0.79916
published_at 2026-05-14T12:55:00Z
1
value 0.01301
scoring_system epss
scoring_elements 0.79679
published_at 2026-04-01T12:55:00Z
2
value 0.01301
scoring_system epss
scoring_elements 0.79686
published_at 2026-04-02T12:55:00Z
3
value 0.01301
scoring_system epss
scoring_elements 0.79707
published_at 2026-04-04T12:55:00Z
4
value 0.01301
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-07T12:55:00Z
5
value 0.01301
scoring_system epss
scoring_elements 0.79721
published_at 2026-04-08T12:55:00Z
6
value 0.01301
scoring_system epss
scoring_elements 0.79728
published_at 2026-04-09T12:55:00Z
7
value 0.01301
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-11T12:55:00Z
8
value 0.01301
scoring_system epss
scoring_elements 0.79733
published_at 2026-04-12T12:55:00Z
9
value 0.01301
scoring_system epss
scoring_elements 0.79727
published_at 2026-04-13T12:55:00Z
10
value 0.01301
scoring_system epss
scoring_elements 0.79756
published_at 2026-04-16T12:55:00Z
11
value 0.01301
scoring_system epss
scoring_elements 0.79757
published_at 2026-04-18T12:55:00Z
12
value 0.01301
scoring_system epss
scoring_elements 0.79761
published_at 2026-04-21T12:55:00Z
13
value 0.01301
scoring_system epss
scoring_elements 0.7979
published_at 2026-04-24T12:55:00Z
14
value 0.01301
scoring_system epss
scoring_elements 0.79797
published_at 2026-04-26T12:55:00Z
15
value 0.01301
scoring_system epss
scoring_elements 0.79811
published_at 2026-04-29T12:55:00Z
16
value 0.01301
scoring_system epss
scoring_elements 0.79826
published_at 2026-05-05T12:55:00Z
17
value 0.01301
scoring_system epss
scoring_elements 0.79851
published_at 2026-05-07T12:55:00Z
18
value 0.01301
scoring_system epss
scoring_elements 0.79867
published_at 2026-05-09T12:55:00Z
19
value 0.01301
scoring_system epss
scoring_elements 0.79862
published_at 2026-05-11T12:55:00Z
20
value 0.01301
scoring_system epss
scoring_elements 0.79879
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7331
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb
10
url VCID-bs39-fprw-dkft
vulnerability_id VCID-bs39-fprw-dkft
summary wireshark: DNS dissector crash in packet-dns.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11356.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11356
reference_id
reference_type
scores
0
value 0.01183
scoring_system epss
scoring_elements 0.7872
published_at 2026-04-01T12:55:00Z
1
value 0.01183
scoring_system epss
scoring_elements 0.78952
published_at 2026-05-14T12:55:00Z
2
value 0.01183
scoring_system epss
scoring_elements 0.78885
published_at 2026-05-07T12:55:00Z
3
value 0.01183
scoring_system epss
scoring_elements 0.789
published_at 2026-05-09T12:55:00Z
4
value 0.01183
scoring_system epss
scoring_elements 0.78896
published_at 2026-05-11T12:55:00Z
5
value 0.01183
scoring_system epss
scoring_elements 0.78914
published_at 2026-05-12T12:55:00Z
6
value 0.01183
scoring_system epss
scoring_elements 0.78727
published_at 2026-04-02T12:55:00Z
7
value 0.01183
scoring_system epss
scoring_elements 0.78758
published_at 2026-04-04T12:55:00Z
8
value 0.01183
scoring_system epss
scoring_elements 0.7874
published_at 2026-04-07T12:55:00Z
9
value 0.01183
scoring_system epss
scoring_elements 0.78766
published_at 2026-04-08T12:55:00Z
10
value 0.01183
scoring_system epss
scoring_elements 0.78773
published_at 2026-04-09T12:55:00Z
11
value 0.01183
scoring_system epss
scoring_elements 0.78797
published_at 2026-04-18T12:55:00Z
12
value 0.01183
scoring_system epss
scoring_elements 0.78779
published_at 2026-04-12T12:55:00Z
13
value 0.01183
scoring_system epss
scoring_elements 0.78771
published_at 2026-04-13T12:55:00Z
14
value 0.01183
scoring_system epss
scoring_elements 0.78799
published_at 2026-04-16T12:55:00Z
15
value 0.01183
scoring_system epss
scoring_elements 0.78793
published_at 2026-04-21T12:55:00Z
16
value 0.01183
scoring_system epss
scoring_elements 0.7882
published_at 2026-04-24T12:55:00Z
17
value 0.01183
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-26T12:55:00Z
18
value 0.01183
scoring_system epss
scoring_elements 0.78844
published_at 2026-04-29T12:55:00Z
19
value 0.01183
scoring_system epss
scoring_elements 0.78863
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11356
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2018-29.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-29.html
9
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
10
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581768
reference_id 1581768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581768
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
13
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
14
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
15
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11356
reference_id CVE-2018-11356
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11356
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11356
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bs39-fprw-dkft
11
url VCID-cpjt-28ch-tub3
vulnerability_id VCID-cpjt-28ch-tub3
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7324
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67716
published_at 2026-05-14T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-05-05T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
13
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
14
value 0.00538
scoring_system epss
scoring_elements 0.67603
published_at 2026-04-26T12:55:00Z
15
value 0.00538
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-29T12:55:00Z
16
value 0.00538
scoring_system epss
scoring_elements 0.67623
published_at 2026-05-07T12:55:00Z
17
value 0.00538
scoring_system epss
scoring_elements 0.6766
published_at 2026-05-09T12:55:00Z
18
value 0.00538
scoring_system epss
scoring_elements 0.67631
published_at 2026-05-11T12:55:00Z
19
value 0.00538
scoring_system epss
scoring_elements 0.67656
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7324
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7324
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3
12
url VCID-e491-5pe9-rbe6
vulnerability_id VCID-e491-5pe9-rbe6
summary wireshark: Out-of-bounds Read in proto.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11359.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11359
reference_id
reference_type
scores
0
value 0.0119
scoring_system epss
scoring_elements 0.78776
published_at 2026-04-01T12:55:00Z
1
value 0.0119
scoring_system epss
scoring_elements 0.79006
published_at 2026-05-14T12:55:00Z
2
value 0.0119
scoring_system epss
scoring_elements 0.78939
published_at 2026-05-07T12:55:00Z
3
value 0.0119
scoring_system epss
scoring_elements 0.78953
published_at 2026-05-09T12:55:00Z
4
value 0.0119
scoring_system epss
scoring_elements 0.7895
published_at 2026-05-11T12:55:00Z
5
value 0.0119
scoring_system epss
scoring_elements 0.78968
published_at 2026-05-12T12:55:00Z
6
value 0.0119
scoring_system epss
scoring_elements 0.78784
published_at 2026-04-02T12:55:00Z
7
value 0.0119
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-04T12:55:00Z
8
value 0.0119
scoring_system epss
scoring_elements 0.78798
published_at 2026-04-07T12:55:00Z
9
value 0.0119
scoring_system epss
scoring_elements 0.78823
published_at 2026-04-08T12:55:00Z
10
value 0.0119
scoring_system epss
scoring_elements 0.7883
published_at 2026-04-09T12:55:00Z
11
value 0.0119
scoring_system epss
scoring_elements 0.78853
published_at 2026-04-11T12:55:00Z
12
value 0.0119
scoring_system epss
scoring_elements 0.78836
published_at 2026-04-12T12:55:00Z
13
value 0.0119
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-13T12:55:00Z
14
value 0.0119
scoring_system epss
scoring_elements 0.78855
published_at 2026-04-16T12:55:00Z
15
value 0.0119
scoring_system epss
scoring_elements 0.78852
published_at 2026-04-18T12:55:00Z
16
value 0.0119
scoring_system epss
scoring_elements 0.7885
published_at 2026-04-21T12:55:00Z
17
value 0.0119
scoring_system epss
scoring_elements 0.78878
published_at 2026-04-24T12:55:00Z
18
value 0.0119
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-26T12:55:00Z
19
value 0.0119
scoring_system epss
scoring_elements 0.789
published_at 2026-04-29T12:55:00Z
20
value 0.0119
scoring_system epss
scoring_elements 0.78917
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11359
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html
8
reference_url https://www.wireshark.org/security/wnpa-sec-2018-33.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-33.html
9
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
10
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581778
reference_id 1581778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581778
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
13
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
14
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
15
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11359
reference_id CVE-2018-11359
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11359
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11359
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e491-5pe9-rbe6
13
url VCID-eb2u-sghj-yqhp
vulnerability_id VCID-eb2u-sghj-yqhp
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11358.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11358
reference_id
reference_type
scores
0
value 0.01586
scoring_system epss
scoring_elements 0.81535
published_at 2026-04-01T12:55:00Z
1
value 0.01586
scoring_system epss
scoring_elements 0.81796
published_at 2026-05-14T12:55:00Z
2
value 0.01586
scoring_system epss
scoring_elements 0.81716
published_at 2026-05-07T12:55:00Z
3
value 0.01586
scoring_system epss
scoring_elements 0.8174
published_at 2026-05-09T12:55:00Z
4
value 0.01586
scoring_system epss
scoring_elements 0.81739
published_at 2026-05-11T12:55:00Z
5
value 0.01586
scoring_system epss
scoring_elements 0.81756
published_at 2026-05-12T12:55:00Z
6
value 0.01586
scoring_system epss
scoring_elements 0.81546
published_at 2026-04-02T12:55:00Z
7
value 0.01586
scoring_system epss
scoring_elements 0.81568
published_at 2026-04-04T12:55:00Z
8
value 0.01586
scoring_system epss
scoring_elements 0.81566
published_at 2026-04-07T12:55:00Z
9
value 0.01586
scoring_system epss
scoring_elements 0.81594
published_at 2026-04-08T12:55:00Z
10
value 0.01586
scoring_system epss
scoring_elements 0.81599
published_at 2026-04-13T12:55:00Z
11
value 0.01586
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-11T12:55:00Z
12
value 0.01586
scoring_system epss
scoring_elements 0.81607
published_at 2026-04-12T12:55:00Z
13
value 0.01586
scoring_system epss
scoring_elements 0.81637
published_at 2026-04-18T12:55:00Z
14
value 0.01586
scoring_system epss
scoring_elements 0.81641
published_at 2026-04-21T12:55:00Z
15
value 0.01586
scoring_system epss
scoring_elements 0.81665
published_at 2026-04-24T12:55:00Z
16
value 0.01586
scoring_system epss
scoring_elements 0.81674
published_at 2026-04-26T12:55:00Z
17
value 0.01586
scoring_system epss
scoring_elements 0.81679
published_at 2026-04-29T12:55:00Z
18
value 0.01586
scoring_system epss
scoring_elements 0.81695
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11358
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html
13
reference_url https://www.debian.org/security/2018/dsa-4217
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4217
14
reference_url https://www.wireshark.org/security/wnpa-sec-2018-31.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-31.html
15
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
16
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581773
reference_id 1581773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581773
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
19
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
20
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
21
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11358
reference_id CVE-2018-11358
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11358
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11358
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eb2u-sghj-yqhp
14
url VCID-er4n-qs89-83ce
vulnerability_id VCID-er4n-qs89-83ce
summary wireshark: Pcapng file parser crash in pcapng.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7420
reference_id
reference_type
scores
0
value 0.02017
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-01T12:55:00Z
1
value 0.02017
scoring_system epss
scoring_elements 0.83685
published_at 2026-04-02T12:55:00Z
2
value 0.02017
scoring_system epss
scoring_elements 0.837
published_at 2026-04-04T12:55:00Z
3
value 0.02017
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-07T12:55:00Z
4
value 0.02017
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-08T12:55:00Z
5
value 0.02017
scoring_system epss
scoring_elements 0.83733
published_at 2026-04-09T12:55:00Z
6
value 0.02017
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-11T12:55:00Z
7
value 0.02017
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-12T12:55:00Z
8
value 0.02017
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-13T12:55:00Z
9
value 0.02017
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-16T12:55:00Z
10
value 0.02017
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-21T12:55:00Z
11
value 0.02017
scoring_system epss
scoring_elements 0.83797
published_at 2026-04-24T12:55:00Z
12
value 0.02017
scoring_system epss
scoring_elements 0.83806
published_at 2026-04-26T12:55:00Z
13
value 0.02017
scoring_system epss
scoring_elements 0.83813
published_at 2026-04-29T12:55:00Z
14
value 0.02017
scoring_system epss
scoring_elements 0.83836
published_at 2026-05-05T12:55:00Z
15
value 0.02017
scoring_system epss
scoring_elements 0.83857
published_at 2026-05-07T12:55:00Z
16
value 0.02017
scoring_system epss
scoring_elements 0.83874
published_at 2026-05-11T12:55:00Z
17
value 0.02017
scoring_system epss
scoring_elements 0.8389
published_at 2026-05-12T12:55:00Z
18
value 0.02017
scoring_system epss
scoring_elements 0.83923
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549284
reference_id 1549284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549284
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7420
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce
15
url VCID-k15e-aq9v-5bg7
vulnerability_id VCID-k15e-aq9v-5bg7
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7327
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57918
published_at 2026-05-14T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
12
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
13
value 0.00355
scoring_system epss
scoring_elements 0.57831
published_at 2026-04-26T12:55:00Z
14
value 0.00355
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-29T12:55:00Z
15
value 0.00355
scoring_system epss
scoring_elements 0.57768
published_at 2026-05-05T12:55:00Z
16
value 0.00355
scoring_system epss
scoring_elements 0.57812
published_at 2026-05-07T12:55:00Z
17
value 0.00355
scoring_system epss
scoring_elements 0.57874
published_at 2026-05-09T12:55:00Z
18
value 0.00355
scoring_system epss
scoring_elements 0.57822
published_at 2026-05-11T12:55:00Z
19
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7327
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7
16
url VCID-kv7a-jf9y-q7dt
vulnerability_id VCID-kv7a-jf9y-q7dt
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7322
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67716
published_at 2026-05-14T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.6747
published_at 2026-04-01T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67506
published_at 2026-04-02T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67527
published_at 2026-04-04T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-07T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67557
published_at 2026-04-08T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-09T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-11T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.6758
published_at 2026-05-05T12:55:00Z
9
value 0.00538
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-13T12:55:00Z
10
value 0.00538
scoring_system epss
scoring_elements 0.67582
published_at 2026-04-16T12:55:00Z
11
value 0.00538
scoring_system epss
scoring_elements 0.67595
published_at 2026-04-18T12:55:00Z
12
value 0.00538
scoring_system epss
scoring_elements 0.67573
published_at 2026-04-21T12:55:00Z
13
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-24T12:55:00Z
14
value 0.00538
scoring_system epss
scoring_elements 0.67603
published_at 2026-04-26T12:55:00Z
15
value 0.00538
scoring_system epss
scoring_elements 0.67606
published_at 2026-04-29T12:55:00Z
16
value 0.00538
scoring_system epss
scoring_elements 0.67623
published_at 2026-05-07T12:55:00Z
17
value 0.00538
scoring_system epss
scoring_elements 0.6766
published_at 2026-05-09T12:55:00Z
18
value 0.00538
scoring_system epss
scoring_elements 0.67631
published_at 2026-05-11T12:55:00Z
19
value 0.00538
scoring_system epss
scoring_elements 0.67656
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7322
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt
17
url VCID-qmm9-abhm-4baz
vulnerability_id VCID-qmm9-abhm-4baz
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7328
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57918
published_at 2026-05-14T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
12
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
13
value 0.00355
scoring_system epss
scoring_elements 0.57831
published_at 2026-04-26T12:55:00Z
14
value 0.00355
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-29T12:55:00Z
15
value 0.00355
scoring_system epss
scoring_elements 0.57768
published_at 2026-05-05T12:55:00Z
16
value 0.00355
scoring_system epss
scoring_elements 0.57812
published_at 2026-05-07T12:55:00Z
17
value 0.00355
scoring_system epss
scoring_elements 0.57874
published_at 2026-05-09T12:55:00Z
18
value 0.00355
scoring_system epss
scoring_elements 0.57822
published_at 2026-05-11T12:55:00Z
19
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7328
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7328
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz
18
url VCID-qrsq-8eac-nfbw
vulnerability_id VCID-qrsq-8eac-nfbw
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7321
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62597
published_at 2026-05-14T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62348
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62407
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62438
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62404
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62453
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62469
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62488
published_at 2026-04-11T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62477
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62455
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.625
published_at 2026-04-16T12:55:00Z
11
value 0.00428
scoring_system epss
scoring_elements 0.62506
published_at 2026-04-18T12:55:00Z
12
value 0.00428
scoring_system epss
scoring_elements 0.62489
published_at 2026-04-21T12:55:00Z
13
value 0.00428
scoring_system epss
scoring_elements 0.62499
published_at 2026-04-24T12:55:00Z
14
value 0.00428
scoring_system epss
scoring_elements 0.62516
published_at 2026-04-26T12:55:00Z
15
value 0.00428
scoring_system epss
scoring_elements 0.62513
published_at 2026-04-29T12:55:00Z
16
value 0.00428
scoring_system epss
scoring_elements 0.62461
published_at 2026-05-05T12:55:00Z
17
value 0.00428
scoring_system epss
scoring_elements 0.62509
published_at 2026-05-07T12:55:00Z
18
value 0.00428
scoring_system epss
scoring_elements 0.62565
published_at 2026-05-09T12:55:00Z
19
value 0.00428
scoring_system epss
scoring_elements 0.62518
published_at 2026-05-11T12:55:00Z
20
value 0.00428
scoring_system epss
scoring_elements 0.62544
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7321
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw
19
url VCID-r8qg-5qpe-wka7
vulnerability_id VCID-r8qg-5qpe-wka7
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7335
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-01T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-02T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-04T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-07T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77019
published_at 2026-04-08T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-09T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.77058
published_at 2026-04-11T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-12T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.77032
published_at 2026-04-13T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-16T12:55:00Z
10
value 0.01005
scoring_system epss
scoring_elements 0.77075
published_at 2026-04-18T12:55:00Z
11
value 0.01005
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-21T12:55:00Z
12
value 0.01005
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-24T12:55:00Z
13
value 0.01005
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-26T12:55:00Z
14
value 0.01005
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-29T12:55:00Z
15
value 0.01005
scoring_system epss
scoring_elements 0.77132
published_at 2026-05-05T12:55:00Z
16
value 0.01005
scoring_system epss
scoring_elements 0.77162
published_at 2026-05-07T12:55:00Z
17
value 0.01005
scoring_system epss
scoring_elements 0.77183
published_at 2026-05-09T12:55:00Z
18
value 0.01005
scoring_system epss
scoring_elements 0.77172
published_at 2026-05-11T12:55:00Z
19
value 0.01005
scoring_system epss
scoring_elements 0.77188
published_at 2026-05-12T12:55:00Z
20
value 0.01005
scoring_system epss
scoring_elements 0.77237
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549244
reference_id 1549244
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549244
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7335
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7
20
url VCID-v27j-rsag-73ce
vulnerability_id VCID-v27j-rsag-73ce
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7325
reference_id
reference_type
scores
0
value 0.00376
scoring_system epss
scoring_elements 0.5931
published_at 2026-05-14T12:55:00Z
1
value 0.00376
scoring_system epss
scoring_elements 0.59077
published_at 2026-04-01T12:55:00Z
2
value 0.00376
scoring_system epss
scoring_elements 0.5915
published_at 2026-05-05T12:55:00Z
3
value 0.00376
scoring_system epss
scoring_elements 0.59174
published_at 2026-04-04T12:55:00Z
4
value 0.00376
scoring_system epss
scoring_elements 0.59139
published_at 2026-04-07T12:55:00Z
5
value 0.00376
scoring_system epss
scoring_elements 0.59189
published_at 2026-04-08T12:55:00Z
6
value 0.00376
scoring_system epss
scoring_elements 0.59202
published_at 2026-04-09T12:55:00Z
7
value 0.00376
scoring_system epss
scoring_elements 0.59222
published_at 2026-04-11T12:55:00Z
8
value 0.00376
scoring_system epss
scoring_elements 0.59204
published_at 2026-04-12T12:55:00Z
9
value 0.00376
scoring_system epss
scoring_elements 0.59185
published_at 2026-04-13T12:55:00Z
10
value 0.00376
scoring_system epss
scoring_elements 0.59221
published_at 2026-04-16T12:55:00Z
11
value 0.00376
scoring_system epss
scoring_elements 0.59226
published_at 2026-04-18T12:55:00Z
12
value 0.00376
scoring_system epss
scoring_elements 0.59206
published_at 2026-04-21T12:55:00Z
13
value 0.00376
scoring_system epss
scoring_elements 0.59188
published_at 2026-04-24T12:55:00Z
14
value 0.00376
scoring_system epss
scoring_elements 0.59207
published_at 2026-04-26T12:55:00Z
15
value 0.00376
scoring_system epss
scoring_elements 0.59192
published_at 2026-04-29T12:55:00Z
16
value 0.00376
scoring_system epss
scoring_elements 0.59198
published_at 2026-05-07T12:55:00Z
17
value 0.00376
scoring_system epss
scoring_elements 0.59255
published_at 2026-05-09T12:55:00Z
18
value 0.00376
scoring_system epss
scoring_elements 0.59213
published_at 2026-05-11T12:55:00Z
19
value 0.00376
scoring_system epss
scoring_elements 0.59239
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7325
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce
21
url VCID-v8cp-tsyw-skeq
vulnerability_id VCID-v8cp-tsyw-skeq
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11362.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11362
reference_id
reference_type
scores
0
value 0.01586
scoring_system epss
scoring_elements 0.81535
published_at 2026-04-01T12:55:00Z
1
value 0.01586
scoring_system epss
scoring_elements 0.81796
published_at 2026-05-14T12:55:00Z
2
value 0.01586
scoring_system epss
scoring_elements 0.81716
published_at 2026-05-07T12:55:00Z
3
value 0.01586
scoring_system epss
scoring_elements 0.8174
published_at 2026-05-09T12:55:00Z
4
value 0.01586
scoring_system epss
scoring_elements 0.81739
published_at 2026-05-11T12:55:00Z
5
value 0.01586
scoring_system epss
scoring_elements 0.81756
published_at 2026-05-12T12:55:00Z
6
value 0.01586
scoring_system epss
scoring_elements 0.81546
published_at 2026-04-02T12:55:00Z
7
value 0.01586
scoring_system epss
scoring_elements 0.81568
published_at 2026-04-04T12:55:00Z
8
value 0.01586
scoring_system epss
scoring_elements 0.81566
published_at 2026-04-07T12:55:00Z
9
value 0.01586
scoring_system epss
scoring_elements 0.81594
published_at 2026-04-08T12:55:00Z
10
value 0.01586
scoring_system epss
scoring_elements 0.81599
published_at 2026-04-13T12:55:00Z
11
value 0.01586
scoring_system epss
scoring_elements 0.8162
published_at 2026-04-11T12:55:00Z
12
value 0.01586
scoring_system epss
scoring_elements 0.81607
published_at 2026-04-12T12:55:00Z
13
value 0.01586
scoring_system epss
scoring_elements 0.81637
published_at 2026-04-18T12:55:00Z
14
value 0.01586
scoring_system epss
scoring_elements 0.81641
published_at 2026-04-21T12:55:00Z
15
value 0.01586
scoring_system epss
scoring_elements 0.81665
published_at 2026-04-24T12:55:00Z
16
value 0.01586
scoring_system epss
scoring_elements 0.81674
published_at 2026-04-26T12:55:00Z
17
value 0.01586
scoring_system epss
scoring_elements 0.81679
published_at 2026-04-29T12:55:00Z
18
value 0.01586
scoring_system epss
scoring_elements 0.81695
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11362
3
reference_url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
reference_id
reference_type
scores
url https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
4
reference_url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
reference_id
reference_type
scores
url https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html
13
reference_url https://www.debian.org/security/2018/dsa-4217
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4217
14
reference_url https://www.wireshark.org/security/wnpa-sec-2018-25.html
reference_id
reference_type
scores
url https://www.wireshark.org/security/wnpa-sec-2018-25.html
15
reference_url http://www.securityfocus.com/bid/104308
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104308
16
reference_url http://www.securitytracker.com/id/1041036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041036
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1581787
reference_id 1581787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1581787
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
reference_id 900708
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900708
19
reference_url https://security.archlinux.org/ASA-201805-23
reference_id ASA-201805-23
reference_type
scores
url https://security.archlinux.org/ASA-201805-23
20
reference_url https://security.archlinux.org/ASA-201805-25
reference_id ASA-201805-25
reference_type
scores
url https://security.archlinux.org/ASA-201805-25
21
reference_url https://security.archlinux.org/AVG-708
reference_id AVG-708
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-708
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11362
reference_id CVE-2018-11362
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11362
28
reference_url https://access.redhat.com/errata/RHSA-2020:1047
reference_id RHSA-2020:1047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1047
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-11362
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8cp-tsyw-skeq
22
url VCID-waws-7w8j-m7cv
vulnerability_id VCID-waws-7w8j-m7cv
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7419
reference_id
reference_type
scores
0
value 0.02017
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-01T12:55:00Z
1
value 0.02017
scoring_system epss
scoring_elements 0.83685
published_at 2026-04-02T12:55:00Z
2
value 0.02017
scoring_system epss
scoring_elements 0.837
published_at 2026-04-04T12:55:00Z
3
value 0.02017
scoring_system epss
scoring_elements 0.83702
published_at 2026-04-07T12:55:00Z
4
value 0.02017
scoring_system epss
scoring_elements 0.83726
published_at 2026-04-08T12:55:00Z
5
value 0.02017
scoring_system epss
scoring_elements 0.83733
published_at 2026-04-09T12:55:00Z
6
value 0.02017
scoring_system epss
scoring_elements 0.83749
published_at 2026-04-11T12:55:00Z
7
value 0.02017
scoring_system epss
scoring_elements 0.83742
published_at 2026-04-12T12:55:00Z
8
value 0.02017
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-13T12:55:00Z
9
value 0.02017
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-16T12:55:00Z
10
value 0.02017
scoring_system epss
scoring_elements 0.83773
published_at 2026-04-21T12:55:00Z
11
value 0.02017
scoring_system epss
scoring_elements 0.83797
published_at 2026-04-24T12:55:00Z
12
value 0.02017
scoring_system epss
scoring_elements 0.83806
published_at 2026-04-26T12:55:00Z
13
value 0.02017
scoring_system epss
scoring_elements 0.83813
published_at 2026-04-29T12:55:00Z
14
value 0.02017
scoring_system epss
scoring_elements 0.83836
published_at 2026-05-05T12:55:00Z
15
value 0.02017
scoring_system epss
scoring_elements 0.83857
published_at 2026-05-07T12:55:00Z
16
value 0.02017
scoring_system epss
scoring_elements 0.83874
published_at 2026-05-11T12:55:00Z
17
value 0.02017
scoring_system epss
scoring_elements 0.8389
published_at 2026-05-12T12:55:00Z
18
value 0.02017
scoring_system epss
scoring_elements 0.83923
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9261
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549308
reference_id 1549308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549308
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7419
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv
23
url VCID-wdq7-4pvq-nbdf
vulnerability_id VCID-wdq7-4pvq-nbdf
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7333
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57918
published_at 2026-05-14T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-01T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57823
published_at 2026-04-02T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-04T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57817
published_at 2026-04-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57872
published_at 2026-04-08T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-09T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.5789
published_at 2026-04-11T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57868
published_at 2026-04-12T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-13T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57876
published_at 2026-04-18T12:55:00Z
11
value 0.00355
scoring_system epss
scoring_elements 0.57853
published_at 2026-04-21T12:55:00Z
12
value 0.00355
scoring_system epss
scoring_elements 0.57811
published_at 2026-04-24T12:55:00Z
13
value 0.00355
scoring_system epss
scoring_elements 0.57831
published_at 2026-04-26T12:55:00Z
14
value 0.00355
scoring_system epss
scoring_elements 0.57813
published_at 2026-04-29T12:55:00Z
15
value 0.00355
scoring_system epss
scoring_elements 0.57768
published_at 2026-05-05T12:55:00Z
16
value 0.00355
scoring_system epss
scoring_elements 0.57812
published_at 2026-05-07T12:55:00Z
17
value 0.00355
scoring_system epss
scoring_elements 0.57874
published_at 2026-05-09T12:55:00Z
18
value 0.00355
scoring_system epss
scoring_elements 0.57822
published_at 2026-05-11T12:55:00Z
19
value 0.00355
scoring_system epss
scoring_elements 0.5785
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7333
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7333
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf
24
url VCID-xhuq-918m-wket
vulnerability_id VCID-xhuq-918m-wket
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7332
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.59177
published_at 2026-05-14T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.58952
published_at 2026-04-01T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.59027
published_at 2026-04-02T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.59049
published_at 2026-04-04T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59015
published_at 2026-04-07T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59066
published_at 2026-05-07T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.59072
published_at 2026-04-21T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.5909
published_at 2026-04-11T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.59053
published_at 2026-04-13T12:55:00Z
9
value 0.00374
scoring_system epss
scoring_elements 0.59088
published_at 2026-04-16T12:55:00Z
10
value 0.00374
scoring_system epss
scoring_elements 0.59093
published_at 2026-04-18T12:55:00Z
11
value 0.00374
scoring_system epss
scoring_elements 0.59052
published_at 2026-04-24T12:55:00Z
12
value 0.00374
scoring_system epss
scoring_elements 0.5907
published_at 2026-04-26T12:55:00Z
13
value 0.00374
scoring_system epss
scoring_elements 0.59057
published_at 2026-04-29T12:55:00Z
14
value 0.00374
scoring_system epss
scoring_elements 0.59016
published_at 2026-05-05T12:55:00Z
15
value 0.00374
scoring_system epss
scoring_elements 0.59123
published_at 2026-05-09T12:55:00Z
16
value 0.00374
scoring_system epss
scoring_elements 0.59078
published_at 2026-05-11T12:55:00Z
17
value 0.00374
scoring_system epss
scoring_elements 0.59106
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7332
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7332
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket
25
url VCID-yug7-qj7h-7bfb
vulnerability_id VCID-yug7-qj7h-7bfb
summary wireshark: FCP dissector crash in packet-fcp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7336
reference_id
reference_type
scores
0
value 0.01008
scoring_system epss
scoring_elements 0.77007
published_at 2026-04-01T12:55:00Z
1
value 0.01008
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-02T12:55:00Z
2
value 0.01008
scoring_system epss
scoring_elements 0.77042
published_at 2026-04-04T12:55:00Z
3
value 0.01008
scoring_system epss
scoring_elements 0.77022
published_at 2026-04-07T12:55:00Z
4
value 0.01008
scoring_system epss
scoring_elements 0.77054
published_at 2026-04-08T12:55:00Z
5
value 0.01008
scoring_system epss
scoring_elements 0.77065
published_at 2026-04-09T12:55:00Z
6
value 0.01008
scoring_system epss
scoring_elements 0.77093
published_at 2026-04-11T12:55:00Z
7
value 0.01008
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-12T12:55:00Z
8
value 0.01008
scoring_system epss
scoring_elements 0.77068
published_at 2026-04-13T12:55:00Z
9
value 0.01008
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-16T12:55:00Z
10
value 0.01008
scoring_system epss
scoring_elements 0.77111
published_at 2026-04-18T12:55:00Z
11
value 0.01008
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-21T12:55:00Z
12
value 0.01008
scoring_system epss
scoring_elements 0.77136
published_at 2026-04-24T12:55:00Z
13
value 0.01008
scoring_system epss
scoring_elements 0.77143
published_at 2026-04-26T12:55:00Z
14
value 0.01008
scoring_system epss
scoring_elements 0.77157
published_at 2026-04-29T12:55:00Z
15
value 0.01008
scoring_system epss
scoring_elements 0.77165
published_at 2026-05-05T12:55:00Z
16
value 0.01008
scoring_system epss
scoring_elements 0.77194
published_at 2026-05-07T12:55:00Z
17
value 0.01008
scoring_system epss
scoring_elements 0.77215
published_at 2026-05-09T12:55:00Z
18
value 0.01008
scoring_system epss
scoring_elements 0.77203
published_at 2026-05-11T12:55:00Z
19
value 0.01008
scoring_system epss
scoring_elements 0.77219
published_at 2026-05-12T12:55:00Z
20
value 0.01008
scoring_system epss
scoring_elements 0.77267
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549270
reference_id 1549270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549270
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7336
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb
26
url VCID-zb31-abbp-2yfp
vulnerability_id VCID-zb31-abbp-2yfp
summary In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7326
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.60042
published_at 2026-05-14T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59801
published_at 2026-04-01T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59878
published_at 2026-04-02T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59903
published_at 2026-04-04T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59873
published_at 2026-04-07T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59923
published_at 2026-04-08T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59936
published_at 2026-04-09T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.59958
published_at 2026-04-11T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.59942
published_at 2026-04-26T12:55:00Z
9
value 0.00388
scoring_system epss
scoring_elements 0.59924
published_at 2026-04-24T12:55:00Z
10
value 0.00388
scoring_system epss
scoring_elements 0.59963
published_at 2026-04-16T12:55:00Z
11
value 0.00388
scoring_system epss
scoring_elements 0.5997
published_at 2026-04-18T12:55:00Z
12
value 0.00388
scoring_system epss
scoring_elements 0.59955
published_at 2026-04-21T12:55:00Z
13
value 0.00388
scoring_system epss
scoring_elements 0.59929
published_at 2026-04-29T12:55:00Z
14
value 0.00388
scoring_system epss
scoring_elements 0.59889
published_at 2026-05-05T12:55:00Z
15
value 0.00388
scoring_system epss
scoring_elements 0.59935
published_at 2026-05-07T12:55:00Z
16
value 0.00388
scoring_system epss
scoring_elements 0.59993
published_at 2026-05-09T12:55:00Z
17
value 0.00388
scoring_system epss
scoring_elements 0.59951
published_at 2026-05-11T12:55:00Z
18
value 0.00388
scoring_system epss
scoring_elements 0.59978
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7326
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
purl pkg:apk/alpine/wireshark@2.2.15-r0?arch=armhf&distroversion=v3.6&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community
aliases CVE-2018-7326
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.2.15-r0%3Farch=armhf&distroversion=v3.6&reponame=community