{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","type":"ebuild","namespace":"net-analyzer","name":"wireshark","version":"1.10.3","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.10.8","latest_non_vulnerable_version":"4.0.11","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36833?format=json","vulnerability_id":"VCID-2ty4-6e2b-rkbs","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5721","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52045","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5206","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52023","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51969","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52019","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.5202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52126","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007197","reference_id":"1007197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007197"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1569","reference_id":"RHSA-2013:1569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0341","reference_id":"RHSA-2014:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0341"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ty4-6e2b-rkbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36821?format=json","vulnerability_id":"VCID-94p1-5cdc-6kbj","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5718","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75531","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75602","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007182","reference_id":"1007182","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007182"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5718"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-94p1-5cdc-6kbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36825?format=json","vulnerability_id":"VCID-9shx-8s8d-cff9","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5719","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54568","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54538","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54591","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54551","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54578","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54643","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007185","reference_id":"1007185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007185"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5719"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9shx-8s8d-cff9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36829?format=json","vulnerability_id":"VCID-bpcr-m57x-nqhp","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5720.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5720","reference_id":"","reference_type":"","scores":[{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59499","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59516","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59526","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59585","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59543","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59571","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00381","scoring_system":"epss","scoring_elements":"0.59641","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007192","reference_id":"1007192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007192"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5720"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpcr-m57x-nqhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36849?format=json","vulnerability_id":"VCID-cbhd-57bb-v3cr","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6340","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75531","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75602","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026541","reference_id":"1026541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026541"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-6340"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbhd-57bb-v3cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36835?format=json","vulnerability_id":"VCID-d8y7-kuwa-eygj","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5722.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5722","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50513","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5037","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50407","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50437","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007201","reference_id":"1007201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007201"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5722"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d8y7-kuwa-eygj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36837?format=json","vulnerability_id":"VCID-db97-defr-7bg1","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6336","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75531","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75602","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026534","reference_id":"1026534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026534"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-6336"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-db97-defr-7bg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36815?format=json","vulnerability_id":"VCID-gvtf-ryfh-zbdj","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5717","reference_id":"","reference_type":"","scores":[{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.4272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.4266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42755","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42681","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.4238","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42474","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42402","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.4243","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42495","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007177","reference_id":"1007177","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007177"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-5717"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gvtf-ryfh-zbdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36846?format=json","vulnerability_id":"VCID-mnmq-wyy5-bqbz","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6339","reference_id":"","reference_type":"","scores":[{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.7834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78355","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78387","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78424","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.7844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78454","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78478","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78495","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78491","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78544","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026540","reference_id":"1026540","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026540"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-6339"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnmq-wyy5-bqbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36841?format=json","vulnerability_id":"VCID-ween-6fh8-gbcj","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6337","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50513","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5037","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50423","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50407","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50437","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026538","reference_id":"1026538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026538"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-6337"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ween-6fh8-gbcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36845?format=json","vulnerability_id":"VCID-xun3-ehkc-8bhx","summary":"Multiple vulnerabilities have been found in Wireshark, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6338","reference_id":"","reference_type":"","scores":[{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7555","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75531","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75602","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026539","reference_id":"1026539","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1026539"},{"reference_url":"https://security.gentoo.org/glsa/201312-13","reference_id":"GLSA-201312-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0342","reference_id":"RHSA-2014:0342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0342"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74550?format=json","purl":"pkg:ebuild/net-analyzer/wireshark@1.10.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}],"aliases":["CVE-2013-6338"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xun3-ehkc-8bhx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.10.3"}