{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","type":"deb","namespace":"debian","name":"wireshark","version":"4.0.17-0+deb12u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4.4.14-0+deb13u1","latest_non_vulnerable_version":"4.4.14-0+deb13u1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=json","vulnerability_id":"VCID-114w-j43h-p3ek","summary":"wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2016","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20318","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20860","reference_id":"20860","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573","reference_id":"2418573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html","reference_id":"wnpa-sec-2025-07.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13945"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=json","vulnerability_id":"VCID-2pgm-khz1-auay","summary":"wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12533","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20884","reference_id":"20884","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572","reference_id":"2418572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html","reference_id":"wnpa-sec-2025-08.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13946"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64426?format=json","vulnerability_id":"VCID-9jam-asdr-cyec","summary":"wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3201","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14676","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14537","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20972","reference_id":"20972","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442641","reference_id":"2442641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442641"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2026-05.html","reference_id":"wnpa-sec-2026-05.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2026-05.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-3201"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71809?format=json","vulnerability_id":"VCID-kdgd-xdqb-9khz","summary":"wireshark: Uncontrolled Recursion in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1492","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16167","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1492"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20373","reference_id":"20373","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20373"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346737","reference_id":"2346737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9121","reference_id":"RHSA-2025:9121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9121"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-01.html","reference_id":"wnpa-sec-2025-01.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-01.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-1492"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=json","vulnerability_id":"VCID-m58x-8cam-3fdy","summary":"wireshark: Improper Handling of Missing Values in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39657","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20114","reference_id":"20114","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20114"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746","reference_id":"2317746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html","reference_id":"wnpa-sec-2024-13.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-9781"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64424?format=json","vulnerability_id":"VCID-mb3r-da54-7kfk","summary":"wireshark: Buffer Over-read in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3203","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10941","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11076","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11023","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442639","reference_id":"2442639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442639"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-3203"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68195?format=json","vulnerability_id":"VCID-mnuz-t2nj-nfh5","summary":"Wireshark: NULL Pointer Dereference in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9817","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10266","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20642","reference_id":"20642","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20642"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392839","reference_id":"2392839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1714","reference_id":"RHSA-2026:1714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2763","reference_id":"RHSA-2026:2763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2763"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-03.html","reference_id":"wnpa-sec-2025-03.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-03.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-9817"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=json","vulnerability_id":"VCID-qs6k-my1v-8qh4","summary":"wireshark: Access of Uninitialized Pointer in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05568","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20823","reference_id":"20823","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293","reference_id":"2416293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23083","reference_id":"RHSA-2025:23083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23142","reference_id":"RHSA-2025:23142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0432","reference_id":"RHSA-2026:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0433","reference_id":"RHSA-2026:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0452","reference_id":"RHSA-2026:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0454","reference_id":"RHSA-2026:0454","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0483","reference_id":"RHSA-2026:0483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0483"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html","reference_id":"wnpa-sec-2025-06.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13499"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=json","vulnerability_id":"VCID-r54z-8gcg-pqg7","summary":"wireshark: MONGO dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00858","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00848","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00861","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00846","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00859","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852","reference_id":"1117852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20724","reference_id":"20724","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20724"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225","reference_id":"2403225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html","reference_id":"wnpa-sec-2025-04.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-11626"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=json","vulnerability_id":"VCID-ra98-yk72-bkfq","summary":"wireshark: Buffer Overflow in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34358","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515","reference_id":"1107515","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20509","reference_id":"20509","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225","reference_id":"2370225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html","reference_id":"wnpa-sec-2025-02.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-5601"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=json","vulnerability_id":"VCID-shbm-pwte-rkgt","summary":"wireshark: Buffer Over-read in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20214","reference_id":"20214","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20214"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763","reference_id":"2327763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html","reference_id":"wnpa-sec-2024-15.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-11596"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=json","vulnerability_id":"VCID-wqn1-t4m4-wben","summary":"Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690","reference_id":"1125690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20944","reference_id":"20944","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762","reference_id":"2429762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html","reference_id":"wnpa-sec-2026-04.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-0960"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=json","vulnerability_id":"VCID-114w-j43h-p3ek","summary":"wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2016","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20318","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20860","reference_id":"20860","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573","reference_id":"2418573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html","reference_id":"wnpa-sec-2025-07.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13945"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78708?format=json","vulnerability_id":"VCID-18xy-vuns-eqcx","summary":"wireshark: NFS dissector memory leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0417","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26041","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.261","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18628","reference_id":"18628","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165846","reference_id":"2165846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165846"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json","reference_id":"CVE-2023-0417.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-02.html","reference_id":"wnpa-sec-2023-02.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:44:08Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-02.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0417"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-18xy-vuns-eqcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78129?format=json","vulnerability_id":"VCID-1b6n-9bub-1ueu","summary":"wireshark: DoS (crash) via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4512","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12579","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4512"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19144","reference_id":"19144","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235813","reference_id":"2235813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235813"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-23.html","reference_id":"wnpa-sec-2023-23.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T15:20:06Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-23.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-4512"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6n-9bub-1ueu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32115?format=json","vulnerability_id":"VCID-1dz1-t49g-47bx","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0586","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0646","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0586"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054047","reference_id":"2054047","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054047"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-0586"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1dz1-t49g-47bx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78706?format=json","vulnerability_id":"VCID-23d3-1z9s-r7ht","summary":"wireshark: iSCSI dissector crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0415","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37152","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0415"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0415"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18796","reference_id":"18796","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165844","reference_id":"2165844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165844"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json","reference_id":"CVE-2023-0415.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-05.html","reference_id":"wnpa-sec-2023-05.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:13:00Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-05.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0415"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23d3-1z9s-r7ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77147?format=json","vulnerability_id":"VCID-2bjq-y76h-qbhd","summary":"wireshark: T.38 dissector crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2955","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26444","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26398","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26537","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2955"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111","reference_id":"1068111","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068111"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19695","reference_id":"19695","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19695"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271741","reference_id":"2271741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271741"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-06.html","reference_id":"wnpa-sec-2024-06.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-17T11:38:47Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-06.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-2955"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bjq-y76h-qbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=json","vulnerability_id":"VCID-2pgm-khz1-auay","summary":"wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12533","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20884","reference_id":"20884","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572","reference_id":"2418572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html","reference_id":"wnpa-sec-2025-08.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13946"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32114?format=json","vulnerability_id":"VCID-436x-av41-43g4","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0585","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1549","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054049","reference_id":"2054049","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054049"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-0585"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-av41-43g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32111?format=json","vulnerability_id":"VCID-63pm-hact-8ybw","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0581","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22439","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0581"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054059","reference_id":"2054059","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054059"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-0581"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63pm-hact-8ybw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78707?format=json","vulnerability_id":"VCID-6exv-jrtx-8yab","summary":"wireshark: GNW dissector crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0416","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17868","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1784","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0416"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18779","reference_id":"18779","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165845","reference_id":"2165845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165845"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json","reference_id":"CVE-2023-0416.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-04.html","reference_id":"wnpa-sec-2023-04.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T17:25:33Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0416"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6exv-jrtx-8yab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76367?format=json","vulnerability_id":"VCID-7cgx-1cxn-7bdk","summary":"wireshark: Editcap secret injection crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4855","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06107","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19782","reference_id":"19782","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19782"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19783","reference_id":"19783","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19783"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19784","reference_id":"19784","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19784"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280711","reference_id":"2280711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280711"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-08.html","reference_id":"wnpa-sec-2024-08.html","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:08Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-4855"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cgx-1cxn-7bdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78704?format=json","vulnerability_id":"VCID-9b6w-s1cn-57hz","summary":"wireshark: dissection engine crash via conversation tracking module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0413","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34818","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34851","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34813","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0413"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0413"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18766","reference_id":"18766","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18766"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165842","reference_id":"2165842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165842"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json","reference_id":"CVE-2023-0413.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-03.html","reference_id":"wnpa-sec-2023-03.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:27Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-03.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0413"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6w-s1cn-57hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95597?format=json","vulnerability_id":"VCID-a9rv-3ka3-67fr","summary":"Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3648","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04154","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05045","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3648"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101","reference_id":"1041101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19105","reference_id":"19105","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19105"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-21.html","reference_id":"wnpa-sec-2023-21.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-23T14:06:24Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-21.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-3648"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rv-3ka3-67fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61361?format=json","vulnerability_id":"VCID-beux-z8f3-bbg4","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2856","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12968","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12943","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19083","reference_id":"19083","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19083"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210824","reference_id":"2210824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210824"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json","reference_id":"CVE-2023-2856.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7015","reference_id":"RHSA-2023:7015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7015"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-16.html","reference_id":"wnpa-sec-2023-16.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:42:30Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-16.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2856"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-beux-z8f3-bbg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32112?format=json","vulnerability_id":"VCID-ce6b-zqtu-jkdt","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0582","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20112","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0582"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054056","reference_id":"2054056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054056"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-0582"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ce6b-zqtu-jkdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77957?format=json","vulnerability_id":"VCID-cvch-5rbz-gyah","summary":"wireshark: NetScreen File Parsing Heap-based Buffer Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6175","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13909","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14049","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19404","reference_id":"19404","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19404"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250151","reference_id":"2250151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250151"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-29.html","reference_id":"wnpa-sec-2023-29.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-06T14:19:21Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-29.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-6175"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cvch-5rbz-gyah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61352?format=json","vulnerability_id":"VCID-d1fd-fcrt-j7bj","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0666","reference_id":"","reference_type":"","scores":[{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.83003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.82969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.82966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.8299","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.82998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.83014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01852","scoring_system":"epss","scoring_elements":"0.83008","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19085","reference_id":"19085","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19085"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210832","reference_id":"2210832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210832"},{"reference_url":"https://takeonme.org/cves/CVE-2023-0666.html","reference_id":"CVE-2023-0666.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://takeonme.org/cves/CVE-2023-0666.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7015","reference_id":"RHSA-2023:7015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7015"},{"reference_url":"https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html","reference_id":"wireshark-4.0.6.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-18.html","reference_id":"wnpa-sec-2023-18.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T15:03:01Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-18.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0666"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1fd-fcrt-j7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61353?format=json","vulnerability_id":"VCID-d95z-wdv1-yye6","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0667","reference_id":"","reference_type":"","scores":[{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45718","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45707","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19086","reference_id":"19086","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19086"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2229692","reference_id":"2229692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2229692"},{"reference_url":"https://takeonme.org/cves/CVE-2023-0667.html","reference_id":"CVE-2023-0667.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/"}],"url":"https://takeonme.org/cves/CVE-2023-0667.html"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-06T20:51:10Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0667"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d95z-wdv1-yye6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61356?format=json","vulnerability_id":"VCID-dc45-d39b-u7bt","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1992.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1992","reference_id":"","reference_type":"","scores":[{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.5324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.5327","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1992"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721","reference_id":"1034721","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18852","reference_id":"18852","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186329","reference_id":"2186329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186329"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json","reference_id":"CVE-2023-1992.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","reference_id":"EHLTD25WNQSPQNELX52UH6YLP4TBLKTT","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","reference_id":"FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","reference_id":"PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-09.html","reference_id":"wnpa-sec-2023-09.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:27:14Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-09.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-1992"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dc45-d39b-u7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61355?format=json","vulnerability_id":"VCID-dy74-uv3r-x7bs","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1161","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41435","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41514","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1161"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756","reference_id":"1033756","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033756"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18839","reference_id":"18839","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176452","reference_id":"2176452","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2176452"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json","reference_id":"CVE-2023-1161.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-08.html","reference_id":"wnpa-sec-2023-08.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-05T20:35:50Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-1161"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dy74-uv3r-x7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61358?format=json","vulnerability_id":"VCID-eed3-ztv5-yqg9","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1994.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1994","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50502","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50468","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50414","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52092","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1994"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721","reference_id":"1034721","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18947","reference_id":"18947","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18947"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186325","reference_id":"2186325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186325"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json","reference_id":"CVE-2023-1994.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","reference_id":"EHLTD25WNQSPQNELX52UH6YLP4TBLKTT","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","reference_id":"FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","reference_id":"PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-11.html","reference_id":"wnpa-sec-2023-11.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:20:06Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-11.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-1994"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eed3-ztv5-yqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74122?format=json","vulnerability_id":"VCID-end1-k29u-m7g8","summary":"wireshark: NTLMSSP dissector crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8250.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8250","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09117","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0917","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8250"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298","reference_id":"1080298","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080298"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19943","reference_id":"19943","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19943"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308421","reference_id":"2308421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308421"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-11.html","reference_id":"wnpa-sec-2024-11.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-29T13:47:07Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-11.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-8250"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-end1-k29u-m7g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32099?format=json","vulnerability_id":"VCID-eqkh-wnhk-5fdh","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4186","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32149","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039013","reference_id":"2039013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039013"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4186"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eqkh-wnhk-5fdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61357?format=json","vulnerability_id":"VCID-fve5-m93p-vbf3","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1993","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49241","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4929","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-1993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1993"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721","reference_id":"1034721","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034721"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18900","reference_id":"18900","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18900"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186327","reference_id":"2186327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2186327"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json","reference_id":"CVE-2023-1993.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/","reference_id":"EHLTD25WNQSPQNELX52UH6YLP4TBLKTT","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/","reference_id":"FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/","reference_id":"PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-10.html","reference_id":"wnpa-sec-2023-10.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:26:37Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-10.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-1993"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fve5-m93p-vbf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77873?format=json","vulnerability_id":"VCID-g38d-wdq8-sfgv","summary":"wireshark: GVCP dissector crash via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0208","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09794","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09926","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09897","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925","reference_id":"1059925","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19496","reference_id":"19496","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19496"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256659","reference_id":"2256659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256659"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-01.html","reference_id":"wnpa-sec-2024-01.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T18:39:20Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-01.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-0208"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g38d-wdq8-sfgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76368?format=json","vulnerability_id":"VCID-h36t-f662-4ufw","summary":"wireshark: Editcap byte chopping crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4853","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19605","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19451","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19724","reference_id":"19724","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19724"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280718","reference_id":"2280718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280718"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-08.html","reference_id":"wnpa-sec-2024-08.html","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:26:24Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-4853"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h36t-f662-4ufw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78703?format=json","vulnerability_id":"VCID-h51a-cp8r-r3fx","summary":"wireshark: TIPC dissector crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0412","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43155","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43156","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0412"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18770","reference_id":"18770","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18770"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165841","reference_id":"2165841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165841"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json","reference_id":"CVE-2023-0412.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-07.html","reference_id":"wnpa-sec-2023-07.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T15:14:54Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-07.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0412"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h51a-cp8r-r3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78767?format=json","vulnerability_id":"VCID-jka6-e5fr-rkcv","summary":"wireshark: multiple (BPv6, OpenFlow, and Kafka protocol) dissector infinite loops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4345","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26191","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4345"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160659","reference_id":"2160659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160659"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json","reference_id":"CVE-2022-4345.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/","reference_id":"RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/","reference_id":"SGWIW6K64PKC375YAONYXKIVT2FDEDV3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2022-09.html","reference_id":"wnpa-sec-2022-09.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T16:45:28Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2022-09.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-4345"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jka6-e5fr-rkcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78126?format=json","vulnerability_id":"VCID-jknb-n171-8udz","summary":"wireshark: possible Denial of Service via crafted package","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2906","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43748","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2906"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19229","reference_id":"19229","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19229"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235363","reference_id":"2235363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235363"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/","reference_id":"6HCUPLDY7HLPO46PHMGIJSUBJFTT237C","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/"},{"reference_url":"https://takeonme.org/cves/CVE-2023-2906.html","reference_id":"CVE-2023-2906.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/"}],"url":"https://takeonme.org/cves/CVE-2023-2906.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/","reference_id":"L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/","reference_id":"TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:36:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2906"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jknb-n171-8udz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95598?format=json","vulnerability_id":"VCID-k49z-j5v1-pkhf","summary":"iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3649","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06464","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0749","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3649"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101","reference_id":"1041101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041101"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19164","reference_id":"19164","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19164"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-22.html","reference_id":"wnpa-sec-2023-22.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:47:51Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-22.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-3649"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k49z-j5v1-pkhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61365?format=json","vulnerability_id":"VCID-k6r8-3ckd-87bf","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2952","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08931","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08981","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0902","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08983","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19100","reference_id":"19100","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19100"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2211406","reference_id":"2211406","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2211406"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json","reference_id":"CVE-2023-2952.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7015","reference_id":"RHSA-2023:7015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7015"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-20.html","reference_id":"wnpa-sec-2023-20.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T19:59:47Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2952"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6r8-3ckd-87bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76354?format=json","vulnerability_id":"VCID-kpe5-12b6-pbes","summary":"wireshark: MONGO and ZigBee TLV dissector infinite loops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4854.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4854","reference_id":"","reference_type":"","scores":[{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.7104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71058","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71096","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4854"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/merge_requests/15047","reference_id":"15047","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/merge_requests/15047"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/merge_requests/15499","reference_id":"15499","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/merge_requests/15499"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19726","reference_id":"19726","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280715","reference_id":"2280715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280715"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-07.html","reference_id":"wnpa-sec-2024-07.html","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-12T14:25:52Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-07.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-4854"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpe5-12b6-pbes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78130?format=json","vulnerability_id":"VCID-ksm5-9amq-aqg1","summary":"wireshark: DoS (memory leak) via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4513","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05809","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235814","reference_id":"2235814","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235814"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-4513"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksm5-9amq-aqg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32095?format=json","vulnerability_id":"VCID-ktks-hvzs-c7ep","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4182","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12716","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4182"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039005","reference_id":"2039005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039005"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4182"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktks-hvzs-c7ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32094?format=json","vulnerability_id":"VCID-ky3g-7wfh-v7fz","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4181","reference_id":"","reference_type":"","scores":[{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39355","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39455","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39525","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39536","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39481","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4181"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039000","reference_id":"2039000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039000"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4181"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ky3g-7wfh-v7fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=json","vulnerability_id":"VCID-m58x-8cam-3fdy","summary":"wireshark: Improper Handling of Missing Values in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39657","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20114","reference_id":"20114","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20114"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746","reference_id":"2317746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html","reference_id":"wnpa-sec-2024-13.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-9781"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32113?format=json","vulnerability_id":"VCID-ne4k-vht4-rue7","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0583","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23229","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23263","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23296","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23239","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054051","reference_id":"2054051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2054051"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-0583"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ne4k-vht4-rue7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78766?format=json","vulnerability_id":"VCID-p3ew-pwr9-7yek","summary":"wireshark: kafka dissector memory exhaustion.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4344","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33339","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33365","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33361","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-4344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4344"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160658","reference_id":"2160658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2160658"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json","reference_id":"CVE-2022-4344.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/","reference_id":"RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/","reference_id":"SGWIW6K64PKC375YAONYXKIVT2FDEDV3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3/"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2022-10.html","reference_id":"wnpa-sec-2022-10.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-08T19:56:17Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2022-10.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-4344"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p3ew-pwr9-7yek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79031?format=json","vulnerability_id":"VCID-prdk-zfnn-cyg3","summary":"wireshark: f5ethtrailer Infinite loop in legacy style dissector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3190","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05384","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05376","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152061","reference_id":"2152061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2373","reference_id":"RHSA-2023:2373","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2373"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2022-3190"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prdk-zfnn-cyg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78702?format=json","vulnerability_id":"VCID-prz6-jk3b-wbhw","summary":"wireshark: Multiple dissector excessive loops","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0411.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0411","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25154","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0411"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18711","reference_id":"18711","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18711"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18720","reference_id":"18720","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18720"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/18737","reference_id":"18737","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/18737"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165825","reference_id":"2165825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2165825"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json","reference_id":"CVE-2023-0411.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html","reference_id":"msg00007.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-06.html","reference_id":"wnpa-sec-2023-06.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T19:27:52Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-06.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0411"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prz6-jk3b-wbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=json","vulnerability_id":"VCID-qs6k-my1v-8qh4","summary":"wireshark: Access of Uninitialized Pointer in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05568","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20823","reference_id":"20823","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293","reference_id":"2416293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23083","reference_id":"RHSA-2025:23083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23142","reference_id":"RHSA-2025:23142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0432","reference_id":"RHSA-2026:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0433","reference_id":"RHSA-2026:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0452","reference_id":"RHSA-2026:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0454","reference_id":"RHSA-2026:0454","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0483","reference_id":"RHSA-2026:0483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0483"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html","reference_id":"wnpa-sec-2025-06.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13499"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=json","vulnerability_id":"VCID-r54z-8gcg-pqg7","summary":"wireshark: MONGO dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00858","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00848","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00861","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00846","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00859","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852","reference_id":"1117852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20724","reference_id":"20724","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20724"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225","reference_id":"2403225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html","reference_id":"wnpa-sec-2025-04.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-11626"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61360?format=json","vulnerability_id":"VCID-r9dr-xdt4-vke2","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2855","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18101","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18056","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19062","reference_id":"19062","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19062"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210822","reference_id":"2210822","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210822"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json","reference_id":"CVE-2023-2855.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-12.html","reference_id":"wnpa-sec-2023-12.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:43:12Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-12.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2855"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r9dr-xdt4-vke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=json","vulnerability_id":"VCID-ra98-yk72-bkfq","summary":"wireshark: Buffer Overflow in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34358","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515","reference_id":"1107515","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20509","reference_id":"20509","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225","reference_id":"2370225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html","reference_id":"wnpa-sec-2025-02.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-5601"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32100?format=json","vulnerability_id":"VCID-s3e9-4cud-ufdn","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4190","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31049","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30996","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4190"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039029","reference_id":"2039029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039029"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4190"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3e9-4cud-ufdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=json","vulnerability_id":"VCID-shbm-pwte-rkgt","summary":"wireshark: Buffer Over-read in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20214","reference_id":"20214","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20214"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763","reference_id":"2327763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html","reference_id":"wnpa-sec-2024-15.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-11596"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77872?format=json","vulnerability_id":"VCID-sj7t-z4pv-7ucz","summary":"wireshark: IEEE 1609.2 dissector crash via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0209","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1283","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0209"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925","reference_id":"1059925","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19501","reference_id":"19501","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19501"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256656","reference_id":"2256656","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256656"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-02.html","reference_id":"wnpa-sec-2024-02.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:33Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-02.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-0209"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sj7t-z4pv-7ucz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61364?format=json","vulnerability_id":"VCID-t7vh-m6cf-rfef","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2879","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29758","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29808","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2879"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19068","reference_id":"19068","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19068"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210466","reference_id":"2210466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210466"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json","reference_id":"CVE-2023-2879.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-14.html","reference_id":"wnpa-sec-2023-14.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T21:33:45Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-14.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2879"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7vh-m6cf-rfef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32098?format=json","vulnerability_id":"VCID-tk9u-gtk1-v3hm","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4185","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32366","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32414","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32387","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039011","reference_id":"2039011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039011"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"},{"reference_url":"https://usn.ubuntu.com/7552-1/","reference_id":"USN-7552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tk9u-gtk1-v3hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61363?format=json","vulnerability_id":"VCID-tvmn-b999-xya7","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2858","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18101","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18056","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19081","reference_id":"19081","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210829","reference_id":"2210829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210829"},{"reference_url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json","reference_id":"CVE-2023-2858.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7015","reference_id":"RHSA-2023:7015","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7015"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-15.html","reference_id":"wnpa-sec-2023-15.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:39:31Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-15.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-2858"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvmn-b999-xya7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96386?format=json","vulnerability_id":"VCID-tyxd-yfmx-z7d7","summary":"SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 4.0.15 allows denial of service via packet injection or crafted capture file","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8645","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2355","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19559","reference_id":"19559","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19559"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-10.html","reference_id":"wnpa-sec-2024-10.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T13:58:18Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-10.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-8645"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyxd-yfmx-z7d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78128?format=json","vulnerability_id":"VCID-u22d-aazu-6khn","summary":"wireshark: DoS (infinite loop) via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4511","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01365","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235812","reference_id":"2235812","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235812"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-4511"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u22d-aazu-6khn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77870?format=json","vulnerability_id":"VCID-vbn8-ghgq-n7g1","summary":"wireshark: DOCSIS dissector crash via packet injection or crafted capture file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0211","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24146","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24294","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925","reference_id":"1059925","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059925"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19557","reference_id":"19557","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19557"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256652","reference_id":"2256652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256652"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-05.html","reference_id":"wnpa-sec-2024-05.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-08T15:36:29Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-05.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2024-0211"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbn8-ghgq-n7g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32097?format=json","vulnerability_id":"VCID-whve-rre4-fbgr","summary":"Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4184.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4184","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54033","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54016","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4184"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039009","reference_id":"2039009","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039009"},{"reference_url":"https://security.gentoo.org/glsa/202210-04","reference_id":"GLSA-202210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2021-4184"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whve-rre4-fbgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=json","vulnerability_id":"VCID-wqn1-t4m4-wben","summary":"Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690","reference_id":"1125690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20944","reference_id":"20944","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762","reference_id":"2429762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html","reference_id":"wnpa-sec-2026-04.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-0960"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61354?format=json","vulnerability_id":"VCID-ycu3-e7vh-2qc4","summary":"Multiple vulnerabilities have been found in Wireshark, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0668.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0668","reference_id":"","reference_type":"","scores":[{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.8021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80238","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/19087","reference_id":"19087","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/19087"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210835","reference_id":"2210835","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210835"},{"reference_url":"https://takeonme.org/cves/CVE-2023-0668.html","reference_id":"CVE-2023-0668.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://takeonme.org/cves/CVE-2023-0668.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5429","reference_id":"dsa-5429","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5429"},{"reference_url":"https://security.gentoo.org/glsa/202309-02","reference_id":"GLSA-202309-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://security.gentoo.org/glsa/202309-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6469","reference_id":"RHSA-2023:6469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6469"},{"reference_url":"https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html","reference_id":"wireshark-4.0.6.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2023-19.html","reference_id":"wnpa-sec-2023-19.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:58:27Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2023-19.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}],"aliases":["CVE-2023-0668"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu3-e7vh-2qc4"}],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"}