| 0 |
| url |
VCID-1her-1nh5-57cx |
| vulnerability_id |
VCID-1her-1nh5-57cx |
| summary |
wireshark: SIGCOMP dissector crash in packet-sigcomp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7418 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77109 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77123 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77132 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77162 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77183 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77172 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77188 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77237 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7418 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7418
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1her-1nh5-57cx |
|
| 1 |
| url |
VCID-1ndt-2ndw-mug2 |
| vulnerability_id |
VCID-1ndt-2ndw-mug2 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7323 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67716 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67603 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67606 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67623 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6766 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67631 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67656 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7323 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7323
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1ndt-2ndw-mug2 |
|
| 2 |
| url |
VCID-6u5q-6d7a-ekd3 |
| vulnerability_id |
VCID-6u5q-6d7a-ekd3 |
| summary |
wireshark: Uncontrolled Resource Consumption in epan/tvbuff.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11357 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78689 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78925 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78857 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78872 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78868 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78886 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78765 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78747 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78767 |
| published_at |
2026-04-16T12:55:00Z |
|
| 15 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78761 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78789 |
| published_at |
2026-04-24T12:55:00Z |
|
| 17 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78796 |
| published_at |
2026-04-26T12:55:00Z |
|
| 18 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78814 |
| published_at |
2026-04-29T12:55:00Z |
|
| 19 |
| value |
0.01179 |
| scoring_system |
epss |
| scoring_elements |
0.78834 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11357 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11357
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6u5q-6d7a-ekd3 |
|
| 3 |
| url |
VCID-99mf-vasd-6qfa |
| vulnerability_id |
VCID-99mf-vasd-6qfa |
| summary |
wireshark: Heap-based Buffer Overflow in packet-gsm_a_dtap.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77882 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78127 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78058 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78074 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78066 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78083 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77889 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77917 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77899 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77927 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.7793 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77957 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77941 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77976 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77975 |
| published_at |
2026-04-18T12:55:00Z |
|
| 15 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77968 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78001 |
| published_at |
2026-04-24T12:55:00Z |
|
| 17 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78008 |
| published_at |
2026-04-26T12:55:00Z |
|
| 18 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78021 |
| published_at |
2026-04-29T12:55:00Z |
|
| 19 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.78031 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11360 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11360
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-99mf-vasd-6qfa |
|
| 4 |
| url |
VCID-9g71-v5zu-tqg3 |
| vulnerability_id |
VCID-9g71-v5zu-tqg3 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7329 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57918 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57831 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57768 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57812 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57874 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5785 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7329 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7329
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9g71-v5zu-tqg3 |
|
| 5 |
| url |
VCID-9xr3-ty4u-ekeh |
| vulnerability_id |
VCID-9xr3-ty4u-ekeh |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7330 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57918 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57831 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57768 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57812 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57874 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5785 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7330 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7330
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr3-ty4u-ekeh |
|
| 6 |
| url |
VCID-a6fx-tsy1-tuc1 |
| vulnerability_id |
VCID-a6fx-tsy1-tuc1 |
| summary |
wireshark: Heap-based Buffer Overflow in SIGCOMP dissector crash in packet-sigcomp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71943 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71985 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72005 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71989 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7203 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72038 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72023 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72067 |
| published_at |
2026-04-29T12:55:00Z |
|
| 13 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72073 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.7206 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72092 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72119 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72082 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72109 |
| published_at |
2026-05-12T12:55:00Z |
|
| 19 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72167 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7320
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6fx-tsy1-tuc1 |
|
| 7 |
| url |
VCID-ap24-btqx-j7eb |
| vulnerability_id |
VCID-ap24-btqx-j7eb |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77109 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77123 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77132 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77162 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77183 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77172 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77188 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77237 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7334
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ap24-btqx-j7eb |
|
| 8 |
| url |
VCID-ardp-y1tu-t7fb |
| vulnerability_id |
VCID-ardp-y1tu-t7fb |
| summary |
wireshark: IPMI dissector crash in packet-ipmi-picmg.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7417 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60658 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60761 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.6079 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60811 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60797 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60779 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60827 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60812 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.608 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60806 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60757 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60805 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60862 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60824 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.6085 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.00401 |
| scoring_system |
epss |
| scoring_elements |
0.60908 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7417 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7417
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ardp-y1tu-t7fb |
|
| 9 |
| url |
VCID-bhf2-h1h2-tybb |
| vulnerability_id |
VCID-bhf2-h1h2-tybb |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7331 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79916 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79679 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79707 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79692 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79733 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79727 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79756 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79757 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79761 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.7979 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79797 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79811 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79826 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79851 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79867 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79862 |
| published_at |
2026-05-11T12:55:00Z |
|
| 20 |
| value |
0.01301 |
| scoring_system |
epss |
| scoring_elements |
0.79879 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7331 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7331
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhf2-h1h2-tybb |
|
| 10 |
| url |
VCID-bs39-fprw-dkft |
| vulnerability_id |
VCID-bs39-fprw-dkft |
| summary |
wireshark: DNS dissector crash in packet-dns.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11356 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.7872 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78952 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78885 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.789 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78896 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78914 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78727 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78758 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78771 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78799 |
| published_at |
2026-04-16T12:55:00Z |
|
| 15 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78793 |
| published_at |
2026-04-21T12:55:00Z |
|
| 16 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.7882 |
| published_at |
2026-04-24T12:55:00Z |
|
| 17 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78827 |
| published_at |
2026-04-26T12:55:00Z |
|
| 18 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78844 |
| published_at |
2026-04-29T12:55:00Z |
|
| 19 |
| value |
0.01183 |
| scoring_system |
epss |
| scoring_elements |
0.78863 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11356 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11356
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bs39-fprw-dkft |
|
| 11 |
| url |
VCID-cpjt-28ch-tub3 |
| vulnerability_id |
VCID-cpjt-28ch-tub3 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67716 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67603 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67606 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67623 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6766 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67631 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67656 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7324 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7324
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cpjt-28ch-tub3 |
|
| 12 |
| url |
VCID-e491-5pe9-rbe6 |
| vulnerability_id |
VCID-e491-5pe9-rbe6 |
| summary |
wireshark: Out-of-bounds Read in proto.c |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11359 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78776 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.79006 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78939 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78953 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.7895 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78968 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78784 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78815 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78798 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.7883 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78836 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78827 |
| published_at |
2026-04-13T12:55:00Z |
|
| 14 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78855 |
| published_at |
2026-04-16T12:55:00Z |
|
| 15 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 16 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-21T12:55:00Z |
|
| 17 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78878 |
| published_at |
2026-04-24T12:55:00Z |
|
| 18 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78884 |
| published_at |
2026-04-26T12:55:00Z |
|
| 19 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.789 |
| published_at |
2026-04-29T12:55:00Z |
|
| 20 |
| value |
0.0119 |
| scoring_system |
epss |
| scoring_elements |
0.78917 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11359 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11359
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e491-5pe9-rbe6 |
|
| 13 |
| url |
VCID-eb2u-sghj-yqhp |
| vulnerability_id |
VCID-eb2u-sghj-yqhp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81535 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81796 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81716 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.8174 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81739 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81756 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81599 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.8162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81607 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81637 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81665 |
| published_at |
2026-04-24T12:55:00Z |
|
| 16 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81674 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81679 |
| published_at |
2026-04-29T12:55:00Z |
|
| 18 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81695 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11358 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11358
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eb2u-sghj-yqhp |
|
| 14 |
| url |
VCID-er4n-qs89-83ce |
| vulnerability_id |
VCID-er4n-qs89-83ce |
| summary |
wireshark: Pcapng file parser crash in pcapng.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7420 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83772 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83797 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83806 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83836 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83857 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83874 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.8389 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83923 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7420 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7420
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-er4n-qs89-83ce |
|
| 15 |
| url |
VCID-k15e-aq9v-5bg7 |
| vulnerability_id |
VCID-k15e-aq9v-5bg7 |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7327 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57918 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57831 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57768 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57812 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57874 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5785 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7327 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7327
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k15e-aq9v-5bg7 |
|
| 16 |
| url |
VCID-kv7a-jf9y-q7dt |
| vulnerability_id |
VCID-kv7a-jf9y-q7dt |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67716 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67527 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67505 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67557 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67594 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6758 |
| published_at |
2026-05-05T12:55:00Z |
|
| 9 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67582 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67603 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67606 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67623 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6766 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67631 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67656 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7322 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7322
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7a-jf9y-q7dt |
|
| 17 |
| url |
VCID-qmm9-abhm-4baz |
| vulnerability_id |
VCID-qmm9-abhm-4baz |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7328 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57918 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57831 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57768 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57812 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57874 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5785 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7328 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7328
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmm9-abhm-4baz |
|
| 18 |
| url |
VCID-qrsq-8eac-nfbw |
| vulnerability_id |
VCID-qrsq-8eac-nfbw |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62597 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62348 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62404 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.625 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62506 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62489 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62499 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62516 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62513 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62461 |
| published_at |
2026-05-05T12:55:00Z |
|
| 17 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62509 |
| published_at |
2026-05-07T12:55:00Z |
|
| 18 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62565 |
| published_at |
2026-05-09T12:55:00Z |
|
| 19 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62518 |
| published_at |
2026-05-11T12:55:00Z |
|
| 20 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62544 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7321 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7321
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrsq-8eac-nfbw |
|
| 19 |
| url |
VCID-r8qg-5qpe-wka7 |
| vulnerability_id |
VCID-r8qg-5qpe-wka7 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77032 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77109 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77123 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77132 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77162 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77183 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77172 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77188 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77237 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7335 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7335
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r8qg-5qpe-wka7 |
|
| 20 |
| url |
VCID-v27j-rsag-73ce |
| vulnerability_id |
VCID-v27j-rsag-73ce |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7325 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.5931 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59077 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.5915 |
| published_at |
2026-05-05T12:55:00Z |
|
| 3 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59174 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59139 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59222 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59185 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59226 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59206 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59207 |
| published_at |
2026-04-26T12:55:00Z |
|
| 15 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-29T12:55:00Z |
|
| 16 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59198 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59255 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59213 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59239 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7325 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7325
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v27j-rsag-73ce |
|
| 21 |
| url |
VCID-v8cp-tsyw-skeq |
| vulnerability_id |
VCID-v8cp-tsyw-skeq |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81535 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81796 |
| published_at |
2026-05-14T12:55:00Z |
|
| 2 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81716 |
| published_at |
2026-05-07T12:55:00Z |
|
| 3 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.8174 |
| published_at |
2026-05-09T12:55:00Z |
|
| 4 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81739 |
| published_at |
2026-05-11T12:55:00Z |
|
| 5 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81756 |
| published_at |
2026-05-12T12:55:00Z |
|
| 6 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81546 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81599 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.8162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81607 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81637 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 15 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81665 |
| published_at |
2026-04-24T12:55:00Z |
|
| 16 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81674 |
| published_at |
2026-04-26T12:55:00Z |
|
| 17 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81679 |
| published_at |
2026-04-29T12:55:00Z |
|
| 18 |
| value |
0.01586 |
| scoring_system |
epss |
| scoring_elements |
0.81695 |
| published_at |
2026-05-05T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-11362 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11362
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v8cp-tsyw-skeq |
|
| 22 |
| url |
VCID-waws-7w8j-m7cv |
| vulnerability_id |
VCID-waws-7w8j-m7cv |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.837 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83772 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83797 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83806 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83836 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83857 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83874 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.8389 |
| published_at |
2026-05-12T12:55:00Z |
|
| 18 |
| value |
0.02017 |
| scoring_system |
epss |
| scoring_elements |
0.83923 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7419 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7419
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-waws-7w8j-m7cv |
|
| 23 |
| url |
VCID-wdq7-4pvq-nbdf |
| vulnerability_id |
VCID-wdq7-4pvq-nbdf |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7333 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57918 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57843 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57817 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57872 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57831 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57813 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57768 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57812 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57874 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.57822 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.00355 |
| scoring_system |
epss |
| scoring_elements |
0.5785 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7333 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7333
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdq7-4pvq-nbdf |
|
| 24 |
| url |
VCID-xhuq-918m-wket |
| vulnerability_id |
VCID-xhuq-918m-wket |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7332 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59177 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.58952 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59027 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59015 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59066 |
| published_at |
2026-05-07T12:55:00Z |
|
| 6 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.5909 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59053 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59088 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59093 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59052 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.5907 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59057 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59016 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59123 |
| published_at |
2026-05-09T12:55:00Z |
|
| 16 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59078 |
| published_at |
2026-05-11T12:55:00Z |
|
| 17 |
| value |
0.00374 |
| scoring_system |
epss |
| scoring_elements |
0.59106 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7332 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7332
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhuq-918m-wket |
|
| 25 |
| url |
VCID-yug7-qj7h-7bfb |
| vulnerability_id |
VCID-yug7-qj7h-7bfb |
| summary |
wireshark: FCP dissector crash in packet-fcp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7336 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77007 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77042 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77022 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77054 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77065 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77093 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77068 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77109 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77111 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77136 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77143 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77157 |
| published_at |
2026-04-29T12:55:00Z |
|
| 15 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77165 |
| published_at |
2026-05-05T12:55:00Z |
|
| 16 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77194 |
| published_at |
2026-05-07T12:55:00Z |
|
| 17 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77215 |
| published_at |
2026-05-09T12:55:00Z |
|
| 18 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77203 |
| published_at |
2026-05-11T12:55:00Z |
|
| 19 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77219 |
| published_at |
2026-05-12T12:55:00Z |
|
| 20 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77267 |
| published_at |
2026-05-14T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7336 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7336
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yug7-qj7h-7bfb |
|
| 26 |
| url |
VCID-zb31-abbp-2yfp |
| vulnerability_id |
VCID-zb31-abbp-2yfp |
| summary |
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7326 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.60042 |
| published_at |
2026-05-14T12:55:00Z |
|
| 1 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59878 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59903 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59873 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59923 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59936 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59942 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.5997 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59929 |
| published_at |
2026-04-29T12:55:00Z |
|
| 14 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59889 |
| published_at |
2026-05-05T12:55:00Z |
|
| 15 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59935 |
| published_at |
2026-05-07T12:55:00Z |
|
| 16 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59993 |
| published_at |
2026-05-09T12:55:00Z |
|
| 17 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59951 |
| published_at |
2026-05-11T12:55:00Z |
|
| 18 |
| value |
0.00388 |
| scoring_system |
epss |
| scoring_elements |
0.59978 |
| published_at |
2026-05-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7326 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7326
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zb31-abbp-2yfp |
|