{"url":"http://public2.vulnerablecode.io/api/packages/524108?format=json","purl":"pkg:apk/alpine/wireshark@2.4.1-r0?arch=armhf&distroversion=v3.9&reponame=community","type":"apk","namespace":"alpine","name":"wireshark","version":"2.4.1-r0","qualifiers":{"arch":"armhf","distroversion":"v3.9","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.4.2-r0","latest_non_vulnerable_version":"2.6.20-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84010?format=json","vulnerability_id":"VCID-3k74-wgy8-xkcd","summary":"wireshark: MSDP dissector infinite loop (wnpa-sec-2017-38)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13767.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13767","reference_id":"","reference_type":"","scores":[{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46803","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46813","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55539","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55538","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55541","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.555","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13767"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13767"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486628","reference_id":"1486628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486628"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/524108?format=json","purl":"pkg:apk/alpine/wireshark@2.4.1-r0?arch=armhf&distroversion=v3.9&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.4.1-r0%3Farch=armhf&distroversion=v3.9&reponame=community"}],"aliases":["CVE-2017-13767"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k74-wgy8-xkcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84013?format=json","vulnerability_id":"VCID-e5um-gbkb-ekev","summary":"wireshark: IrCOMM dissector buffer overrun (wnpa-sec-2017-41)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13765.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13765","reference_id":"","reference_type":"","scores":[{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.7874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78765","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78689","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01179","scoring_system":"epss","scoring_elements":"0.78726","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13765"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486631","reference_id":"1486631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486631"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/524108?format=json","purl":"pkg:apk/alpine/wireshark@2.4.1-r0?arch=armhf&distroversion=v3.9&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.4.1-r0%3Farch=armhf&distroversion=v3.9&reponame=community"}],"aliases":["CVE-2017-13765"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5um-gbkb-ekev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84011?format=json","vulnerability_id":"VCID-wxux-mu2p-x7by","summary":"wireshark: Profinet I/O buffer overrun (wnpa-sec-2017-39)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13766.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13766","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49014","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.6354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.6342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.6348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63506","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13766"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486629","reference_id":"1486629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486629"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/524108?format=json","purl":"pkg:apk/alpine/wireshark@2.4.1-r0?arch=armhf&distroversion=v3.9&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.4.1-r0%3Farch=armhf&distroversion=v3.9&reponame=community"}],"aliases":["CVE-2017-13766"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxux-mu2p-x7by"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wireshark@2.4.1-r0%3Farch=armhf&distroversion=v3.9&reponame=community"}