Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/74550?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "type": "ebuild", "namespace": "net-analyzer", "name": "wireshark", "version": "1.10.3", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.10.8", "latest_non_vulnerable_version": "4.0.11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36833?format=api", "vulnerability_id": "VCID-2ty4-6e2b-rkbs", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.5201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52113", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52097", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52081", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52121", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.5206", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52023", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51969", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52019", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197", "reference_id": "1007197", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007197" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1569", "reference_id": "RHSA-2013:1569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0341", "reference_id": "RHSA-2014:0341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0341" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5721" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ty4-6e2b-rkbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36821?format=api", "vulnerability_id": "VCID-94p1-5cdc-6kbj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5718.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5718.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75452", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75481", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75486", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75525", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007182", "reference_id": "1007182", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007182" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5718" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-94p1-5cdc-6kbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36825?format=api", "vulnerability_id": "VCID-9shx-8s8d-cff9", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5719.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5719.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5719", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54561", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54572", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5461", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54589", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54554", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54568", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54547", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54538", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5719" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007185", "reference_id": "1007185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007185" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5719" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9shx-8s8d-cff9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36829?format=api", "vulnerability_id": "VCID-bpcr-m57x-nqhp", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5720.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5720.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5720", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59401", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59499", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59465", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59532", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59535", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59508", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59528", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59478", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59526", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007192", "reference_id": "1007192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007192" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5720" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpcr-m57x-nqhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36849?format=api", "vulnerability_id": "VCID-cbhd-57bb-v3cr", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75452", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75481", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75486", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75525", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026541", "reference_id": "1026541", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026541" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-6340" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbhd-57bb-v3cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36835?format=api", "vulnerability_id": "VCID-d8y7-kuwa-eygj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5722.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50422", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50561", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50484", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50493", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50447", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5037", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50423", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007201", "reference_id": "1007201", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007201" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5722" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8y7-kuwa-eygj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36837?format=api", "vulnerability_id": "VCID-db97-defr-7bg1", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75452", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75481", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75486", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75525", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026534", "reference_id": "1026534", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026534" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-6336" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-db97-defr-7bg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36815?format=api", "vulnerability_id": "VCID-gvtf-ryfh-zbdj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5717.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5717.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.4272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.4266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42725", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42755", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42681", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42521", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.4238", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42457", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007177", "reference_id": "1007177", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007177" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-5717" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gvtf-ryfh-zbdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36846?format=api", "vulnerability_id": "VCID-mnmq-wyy5-bqbz", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78303", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.7834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78355", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78381", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78364", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78387", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78385", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78382", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78416", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78424", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.7844", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78454", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78478", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026540", "reference_id": "1026540", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026540" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-6339" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mnmq-wyy5-bqbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36841?format=api", "vulnerability_id": "VCID-ween-6fh8-gbcj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6337", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50422", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50561", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50484", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50493", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50447", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5037", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50423", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026538", "reference_id": "1026538", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026538" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-6337" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ween-6fh8-gbcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36845?format=api", "vulnerability_id": "VCID-xun3-ehkc-8bhx", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75452", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75481", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75486", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75525", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026539", "reference_id": "1026539", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026539" }, { "reference_url": "https://security.gentoo.org/glsa/201312-13", "reference_id": "GLSA-201312-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201312-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0342", "reference_id": "RHSA-2014:0342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0342" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74550?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.10.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" } ], "aliases": [ "CVE-2013-6338" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xun3-ehkc-8bhx" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3" }