Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85416?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "type": "ebuild", "namespace": "net-analyzer", "name": "wireshark", "version": "1.12.7", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.0.2", "latest_non_vulnerable_version": "4.0.11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60643?format=api", "vulnerability_id": "VCID-11mj-zcdb-pygj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3811.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40291", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4057", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40651", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4068", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.406", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.4066", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40678", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40622", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40668", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40638", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40559", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40458", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40445", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40363", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40223", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222436", "reference_id": "1222436", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222436" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0631", "reference_id": "RHSA-2017:0631", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0631" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3811" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-11mj-zcdb-pygj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60647?format=api", "vulnerability_id": "VCID-4afp-5dfv-t7f1", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3815.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3815.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69401", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69429", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69496", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69516", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.6956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69536", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69577", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222440", "reference_id": "1222440", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222440" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3815" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4afp-5dfv-t7f1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60637?format=api", "vulnerability_id": "VCID-614y-v9cc-dkeq", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2190.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53571", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53567", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53619", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53624", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53608", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.5357", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53583", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53547", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53501", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53549", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199166", "reference_id": "1199166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199166" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2190" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-614y-v9cc-dkeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60646?format=api", "vulnerability_id": "VCID-9njt-sx6b-vuh2", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3814.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38048", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37989", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37969", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37694", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37672", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3758", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37464", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37534", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222439", "reference_id": "1222439", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222439" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3814" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9njt-sx6b-vuh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60649?format=api", "vulnerability_id": "VCID-azrg-g68a-8ydz", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4651.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4651.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68066", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68085", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68129", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68154", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.6814", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68107", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68143", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68138", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.6818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.6819", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68168", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00555", "scoring_system": "epss", "scoring_elements": "0.68213", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234415", "reference_id": "1234415", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234415" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-4651" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azrg-g68a-8ydz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59790?format=api", "vulnerability_id": "VCID-e4d2-zqc3-kfc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2191.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2191.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2191", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87669", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87693", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.8772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87731", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87725", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87734", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87751", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87758", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87757", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87771", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03569", "scoring_system": "epss", "scoring_elements": "0.87786", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199167", "reference_id": "1199167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199167" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1460", "reference_id": "RHSA-2015:1460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2191" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e4d2-zqc3-kfc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60650?format=api", "vulnerability_id": "VCID-ew5d-74bs-3qb9", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4652.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67337", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67374", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.6744", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67462", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67452", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67444", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67473", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67447", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234416", "reference_id": "1234416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234416" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-4652" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ew5d-74bs-3qb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59786?format=api", "vulnerability_id": "VCID-g5j9-sn4f-u3at", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2188.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56572", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56668", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56689", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.5672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56733", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56708", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56718", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56627", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56644", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56583", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00339", "scoring_system": "epss", "scoring_elements": "0.56629", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199163", "reference_id": "1199163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199163" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2188" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g5j9-sn4f-u3at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60641?format=api", "vulnerability_id": "VCID-hp3j-b29r-97fn", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3809.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67702", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67767", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.6778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67793", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67803", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67807", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67783", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00544", "scoring_system": "epss", "scoring_elements": "0.67825", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222433", "reference_id": "1222433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222433" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3809" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hp3j-b29r-97fn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60648?format=api", "vulnerability_id": "VCID-j7nh-8352-1ucn", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68245", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68295", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68311", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68342", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68323", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68367", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68374", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68378", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68356", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00561", "scoring_system": "epss", "scoring_elements": "0.68399", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3906" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7nh-8352-1ucn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60642?format=api", "vulnerability_id": "VCID-kez7-g197-nkaj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3810.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65957", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65952", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66004", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66035", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66022", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65991", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66041", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66049", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6606", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66058", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66081", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222434", "reference_id": "1222434", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222434" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3810" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kez7-g197-nkaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60636?format=api", "vulnerability_id": "VCID-t12n-tcb3-qkgj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2187.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55822", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55987", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55998", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.5596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55996", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55974", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55901", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55921", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55845", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0033", "scoring_system": "epss", "scoring_elements": "0.55892", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199162", "reference_id": "1199162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199162" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2187" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t12n-tcb3-qkgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60638?format=api", "vulnerability_id": "VCID-teh2-gpt2-fubr", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2192.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69401", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69429", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69458", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69496", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69516", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69555", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.6956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69536", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00601", "scoring_system": "epss", "scoring_elements": "0.69577", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199168", "reference_id": "1199168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199168" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2192" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teh2-gpt2-fubr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60640?format=api", "vulnerability_id": "VCID-vpys-tuwc-8bgc", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52984", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52942", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53004", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53047", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52982", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52933", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222433", "reference_id": "1222433", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222433" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3808" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpys-tuwc-8bgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60639?format=api", "vulnerability_id": "VCID-w8za-gdr4-mbfm", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3182.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24769", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24816", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24692", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25046", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25005", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24965", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24957", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24929", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24873", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2486", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3182" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=373deb5f4182a5c4ab8c8418a7bbaa5d6e72bb05", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=373deb5f4182a5c4ab8c8418a7bbaa5d6e72bb05" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3182" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/74586", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/74586" }, { "reference_url": "http://www.securitytracker.com/id/1032279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1032279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219409", "reference_id": "1219409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219409" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.10.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.10.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.10.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3182", "reference_id": "CVE-2015-3182", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3182" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3182" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8za-gdr4-mbfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59787?format=api", "vulnerability_id": "VCID-xbk5-zu1n-3yd5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2189.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2189.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2189", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.60926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.60998", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61046", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61049", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.6109", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61095", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61079", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61066", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61072", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61021", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00406", "scoring_system": "epss", "scoring_elements": "0.61071", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199165", "reference_id": "1199165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199165" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372", "reference_id": "780372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780372" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1460", "reference_id": "RHSA-2015:1460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-2189" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbk5-zu1n-3yd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60645?format=api", "vulnerability_id": "VCID-xwcn-89tc-pben", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3813.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3813.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57369", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57308", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.5744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57374", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57396", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57375", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00349", "scoring_system": "epss", "scoring_elements": "0.57325", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222438", "reference_id": "1222438", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222438" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0631", "reference_id": "RHSA-2017:0631", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0631" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3813" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwcn-89tc-pben" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60644?format=api", "vulnerability_id": "VCID-y2bx-qdu3-8bhv", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n attackers to cause Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3812.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68912", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68929", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.6895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68979", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69007", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.68977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69018", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69028", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69008", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69059", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69065", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69072", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69053", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00583", "scoring_system": "epss", "scoring_elements": "0.69096", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222437", "reference_id": "1222437", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222437" }, { "reference_url": "https://security.gentoo.org/glsa/201510-03", "reference_id": "GLSA-201510-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2393", "reference_id": "RHSA-2015:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0631", "reference_id": "RHSA-2017:0631", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0631" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85416?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@1.12.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" } ], "aliases": [ "CVE-2015-3812" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2bx-qdu3-8bhv" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@1.12.7" }