Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942797?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "wireshark", "version": "2.0.2+ga16e22e-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.0.3+geed34f0-1", "latest_non_vulnerable_version": "4.6.3-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85313?format=api", "vulnerability_id": "VCID-2n1p-rftx-87af", "summary": "wireshark: IEEE 802.11 dissector crash (wnpa-sec-2016-13)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4416.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29196", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29406", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29342", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29782", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29829", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29746", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29645", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.296", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2952", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4416" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11818" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4416" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-13.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-13.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312796", "reference_id": "1312796", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312796" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4416", "reference_id": "CVE-2016-4416", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4416" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4416" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n1p-rftx-87af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62558?format=api", "vulnerability_id": "VCID-5k1d-4d86-dfg6", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4421.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66786", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66819", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66816", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.6667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.6671", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66736", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66783", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66781", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66805", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4421" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-18.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-18.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312801", "reference_id": "1312801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312801" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4421", "reference_id": "CVE-2016-4421", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4421" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4421" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k1d-4d86-dfg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62556?format=api", "vulnerability_id": "VCID-62bs-mh4t-2fbr", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4417.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44051", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44132", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4417" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-14.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-14.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312797", "reference_id": "1312797", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312797" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4417", "reference_id": "CVE-2016-4417", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4417" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4417" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62bs-mh4t-2fbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61617?format=api", "vulnerability_id": "VCID-8vc7-5a1y-zkhj", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2532.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80586", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.8064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80702", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2532" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3516" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-11.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312792", "reference_id": "1312792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312792" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2532", "reference_id": "CVE-2016-2532", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2532" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2532" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vc7-5a1y-zkhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61610?format=api", "vulnerability_id": "VCID-dahm-c8ym-m3dy", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2525.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52641", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52697", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52649", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52736", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5273", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.5278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52764", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52748", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52793", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52776", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00294", "scoring_system": "epss", "scoring_elements": "0.52726", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2525" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12077" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6a47ac7624993b99966e1d813245ffb419a2d201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6a47ac7624993b99966e1d813245ffb419a2d201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2525" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-05.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-05.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312781", "reference_id": "1312781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312781" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2525", "reference_id": "CVE-2016-2525", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2525" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2525" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dahm-c8ym-m3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62557?format=api", "vulnerability_id": "VCID-hwpy-ux4y-que1", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4418.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36875", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37081", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36994", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37398", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37423", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37361", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37389", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37112", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4418" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-15.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-15.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312798", "reference_id": "1312798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312798" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4418", "reference_id": "CVE-2016-4418", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4418" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4418" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwpy-ux4y-que1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85314?format=api", "vulnerability_id": "VCID-m1w5-r3jt-fkbh", "summary": "wireshark: SPICE dissector large loop (wnpa-sec-2016-16)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4419.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30265", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30488", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30405", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30799", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30928", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30975", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30792", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3084", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30805", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3077", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30603", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4419" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4419" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-16.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-16.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312799", "reference_id": "1312799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312799" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4419", "reference_id": "CVE-2016-4419", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4419" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4419" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m1w5-r3jt-fkbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61612?format=api", "vulnerability_id": "VCID-mxn4-wkkf-vyam", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2527.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39789", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40283", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40294", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40268", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40188", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39999", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2527" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11982" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=140aad08e081489b5cdb715cb5bca01db856fded", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=140aad08e081489b5cdb715cb5bca01db856fded" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2527" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-07.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-07.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312784", "reference_id": "1312784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312784" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2527", "reference_id": "CVE-2016-2527", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2527" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2527" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxn4-wkkf-vyam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61613?format=api", "vulnerability_id": "VCID-n1tm-sbdj-wudq", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2528.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2528.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4359", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43837", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43881", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43835", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43885", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43843", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43795", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43797", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2528" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c090e929269a78bf7a4cb3dc0d34565f4351312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c090e929269a78bf7a4cb3dc0d34565f4351312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2528" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-08.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-08.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312785", "reference_id": "1312785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312785" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2528", "reference_id": "CVE-2016-2528", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2528" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2528" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1tm-sbdj-wudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61614?format=api", "vulnerability_id": "VCID-qkrb-nnzr-6udf", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2529.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37607", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37996", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38176", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38199", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3807", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38146", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38132", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38112", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38048", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37833", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3781", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2529" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11985" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96d585a5e9baef21e1eea8505d78305b034dc80e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96d585a5e9baef21e1eea8505d78305b034dc80e" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2529" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-09.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-09.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312787", "reference_id": "1312787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312787" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2529", "reference_id": "CVE-2016-2529", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2529" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2529" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkrb-nnzr-6udf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61608?format=api", "vulnerability_id": "VCID-r2uq-bt9u-mba8", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2523.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2523.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89645", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.8958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89593", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89623", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04921", "scoring_system": "epss", "scoring_elements": "0.89641", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2523" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3516" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-03.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-03.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312779", "reference_id": "1312779", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312779" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2523", "reference_id": "CVE-2016-2523", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2523" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2523" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r2uq-bt9u-mba8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61611?format=api", "vulnerability_id": "VCID-rm56-bvqx-9fdt", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2526.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2526.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44051", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44132", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44136", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2526" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11983" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69a679cc3a9c087064b7e9521b9e9f3c40dd0b72", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69a679cc3a9c087064b7e9521b9e9f3c40dd0b72" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2526" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-06.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-06.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312783", "reference_id": "1312783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312783" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2526", "reference_id": "CVE-2016-2526", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2526" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2526" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rm56-bvqx-9fdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85312?format=api", "vulnerability_id": "VCID-tmdk-wp4u-2qd6", "summary": "wireshark: Ixia IxVeriWave file parser crash (wnpa-sec-2016-12)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4415.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59792", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59857", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5983", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59709", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59828", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59841", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59845", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59827", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59865", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59872", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4415" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11795" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=647" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4415" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-12.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-12.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312795", "reference_id": "1312795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312795" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4415", "reference_id": "CVE-2016-4415", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4415" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4415" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmdk-wp4u-2qd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61607?format=api", "vulnerability_id": "VCID-tyem-4kjt-9udy", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2522.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44051", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44132", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44136", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2522" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11828" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9b2f3f7c5c9205381cb72e42b66e97d8ed3abf63", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9b2f3f7c5c9205381cb72e42b66e97d8ed3abf63" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2522" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-02.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-02.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312777", "reference_id": "1312777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312777" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2522", "reference_id": "CVE-2016-2522", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2522" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2522" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyem-4kjt-9udy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61615?format=api", "vulnerability_id": "VCID-vht1-y2pt-1bfg", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2530.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2530.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80586", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.8064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80702", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2530" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3516" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-10.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312790", "reference_id": "1312790", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312790" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2530", "reference_id": "CVE-2016-2530", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2530" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2530" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vht1-y2pt-1bfg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61616?format=api", "vulnerability_id": "VCID-xekw-5s8p-6qdk", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2531.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80586", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.8064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80671", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01429", "scoring_system": "epss", "scoring_elements": "0.80702", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2531" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4421" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3516" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-10.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-10.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312790", "reference_id": "1312790", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312790" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2531", "reference_id": "CVE-2016-2531", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2531" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2531" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xekw-5s8p-6qdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61609?format=api", "vulnerability_id": "VCID-ybwy-thk4-9udy", "summary": "Multiple vulnerabilities have been found in Wireshark, allowing\n local attackers to escalate privileges and remote attackers to cause Denial\n of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2524.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44051", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44265", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44292", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44132", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44136", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2524" }, { "reference_url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12002" }, { "reference_url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a8020a1b6bb73fcb8bb7eb7d53177bc8a9fc703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a8020a1b6bb73fcb8bb7eb7d53177bc8a9fc703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2524" }, { "reference_url": "http://www.securitytracker.com/id/1035118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035118" }, { "reference_url": "http://www.wireshark.org/security/wnpa-sec-2016-04.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.wireshark.org/security/wnpa-sec-2016-04.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312780", "reference_id": "1312780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312780" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2524", "reference_id": "CVE-2016-2524", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2524" }, { "reference_url": "https://security.gentoo.org/glsa/201604-05", "reference_id": "GLSA-201604-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2524" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybwy-thk4-9udy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85315?format=api", "vulnerability_id": "VCID-z4zj-a3ry-4qcg", "summary": "wireshark: NFS dissector crash (wnpa-sec-2016-17)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4420.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28772", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28991", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29323", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29444", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29361", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29364", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29265", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2922", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29101", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4420" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.wireshark.org/security/wnpa-sec-2016-17.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wireshark.org/security/wnpa-sec-2016-17.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312800", "reference_id": "1312800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312800" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4420", "reference_id": "CVE-2016-4420", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4420" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942797?format=api", "purl": "pkg:deb/debian/wireshark@2.0.2%2Bga16e22e-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942729?format=api", "purl": "pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7cgx-1cxn-7bdk" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942727?format=api", "purl": "pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-114w-j43h-p3ek" }, { "vulnerability": "VCID-2pgm-khz1-auay" }, { "vulnerability": "VCID-9jam-asdr-cyec" }, { "vulnerability": "VCID-kdgd-xdqb-9khz" }, { "vulnerability": "VCID-m58x-8cam-3fdy" }, { "vulnerability": "VCID-mb3r-da54-7kfk" }, { "vulnerability": "VCID-mnuz-t2nj-nfh5" }, { "vulnerability": "VCID-qs6k-my1v-8qh4" }, { "vulnerability": "VCID-r54z-8gcg-pqg7" }, { "vulnerability": "VCID-ra98-yk72-bkfq" }, { "vulnerability": "VCID-shbm-pwte-rkgt" }, { "vulnerability": "VCID-wqn1-t4m4-wben" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942731?format=api", "purl": "pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942730?format=api", "purl": "pkg:deb/debian/wireshark@4.6.4-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ra8-e2ag-cuh9" }, { "vulnerability": "VCID-7m5n-82x7-vfen" }, { "vulnerability": "VCID-gqrh-exr5-pbfe" }, { "vulnerability": "VCID-m2de-ys7x-6qdp" }, { "vulnerability": "VCID-u4yz-db9x-kkck" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-4420" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4zj-a3ry-4qcg" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@2.0.2%252Bga16e22e-1%3Fdistro=trixie" }