{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","type":"deb","namespace":"debian","name":"wireshark","version":"4.4.14-0+deb13u1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66397?format=json","vulnerability_id":"VCID-114w-j43h-p3ek","summary":"wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2016","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20318","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20860","reference_id":"20860","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573","reference_id":"2418573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418573"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html","reference_id":"wnpa-sec-2025-07.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T15:59:21Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-07.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13945"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-114w-j43h-p3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66396?format=json","vulnerability_id":"VCID-2pgm-khz1-auay","summary":"wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12533","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20884","reference_id":"20884","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572","reference_id":"2418572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418572"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html","reference_id":"wnpa-sec-2025-08.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:28:11Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-08.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13946"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgm-khz1-auay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64426?format=json","vulnerability_id":"VCID-9jam-asdr-cyec","summary":"wireshark: Improperly Controlled Sequential Memory Allocation in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3201","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14676","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14537","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20972","reference_id":"20972","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442641","reference_id":"2442641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442641"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2026-05.html","reference_id":"wnpa-sec-2026-05.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T20:56:19Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2026-05.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-3201"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jam-asdr-cyec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71809?format=json","vulnerability_id":"VCID-kdgd-xdqb-9khz","summary":"wireshark: Uncontrolled Recursion in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1492","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16167","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1492"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20373","reference_id":"20373","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20373"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346737","reference_id":"2346737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2346737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9121","reference_id":"RHSA-2025:9121","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9121"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-01.html","reference_id":"wnpa-sec-2025-01.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-20T14:21:58Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-01.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-1492"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdgd-xdqb-9khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73679?format=json","vulnerability_id":"VCID-m58x-8cam-3fdy","summary":"wireshark: Improper Handling of Missing Values in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39657","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20114","reference_id":"20114","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20114"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746","reference_id":"2317746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317746"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html","reference_id":"wnpa-sec-2024-13.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-10T14:36:27Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-13.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-9781"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m58x-8cam-3fdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64424?format=json","vulnerability_id":"VCID-mb3r-da54-7kfk","summary":"wireshark: Buffer Over-read in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3203","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10941","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11076","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11023","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3203"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442639","reference_id":"2442639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442639"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-3203"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3r-da54-7kfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68195?format=json","vulnerability_id":"VCID-mnuz-t2nj-nfh5","summary":"Wireshark: NULL Pointer Dereference in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9817","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10266","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20642","reference_id":"20642","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20642"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392839","reference_id":"2392839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1714","reference_id":"RHSA-2026:1714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2763","reference_id":"RHSA-2026:2763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2763"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-03.html","reference_id":"wnpa-sec-2025-03.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-09-04T03:55:18Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-03.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-9817"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnuz-t2nj-nfh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66435?format=json","vulnerability_id":"VCID-qs6k-my1v-8qh4","summary":"wireshark: Access of Uninitialized Pointer in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05568","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20823","reference_id":"20823","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293","reference_id":"2416293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23083","reference_id":"RHSA-2025:23083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23142","reference_id":"RHSA-2025:23142","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23142"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0432","reference_id":"RHSA-2026:0432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0433","reference_id":"RHSA-2026:0433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0452","reference_id":"RHSA-2026:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0454","reference_id":"RHSA-2026:0454","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0483","reference_id":"RHSA-2026:0483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0483"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html","reference_id":"wnpa-sec-2025-06.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-22T04:55:20Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-06.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-13499"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qs6k-my1v-8qh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66911?format=json","vulnerability_id":"VCID-r54z-8gcg-pqg7","summary":"wireshark: MONGO dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626","reference_id":"","reference_type":"","scores":[{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00858","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00848","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00861","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00863","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00852","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00846","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00859","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852","reference_id":"1117852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117852"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20724","reference_id":"20724","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20724"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225","reference_id":"2403225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html","reference_id":"wnpa-sec-2025-04.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-14T13:43:17Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-11626"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r54z-8gcg-pqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69466?format=json","vulnerability_id":"VCID-ra98-yk72-bkfq","summary":"wireshark: Buffer Overflow in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34358","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5601"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515","reference_id":"1107515","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107515"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20509","reference_id":"20509","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225","reference_id":"2370225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370225"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html","reference_id":"wnpa-sec-2025-02.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-04T13:13:50Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2025-02.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2025-5601"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ra98-yk72-bkfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72689?format=json","vulnerability_id":"VCID-shbm-pwte-rkgt","summary":"wireshark: Buffer Over-read in Wireshark","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07645","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11596"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20214","reference_id":"20214","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20214"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763","reference_id":"2327763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2327763"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html","reference_id":"wnpa-sec-2024-15.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-22T15:39:01Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2024-15.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2024-11596"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shbm-pwte-rkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65003?format=json","vulnerability_id":"VCID-wqn1-t4m4-wben","summary":"Wireshark: Wireshark: Denial of Service via HTTP3 protocol dissector infinite loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0273","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0960"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690","reference_id":"1125690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125690"},{"reference_url":"https://gitlab.com/wireshark/wireshark/-/issues/20944","reference_id":"20944","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://gitlab.com/wireshark/wireshark/-/issues/20944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762","reference_id":"2429762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429762"},{"reference_url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html","reference_id":"wnpa-sec-2026-04.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T21:15:29Z/"}],"url":"https://www.wireshark.org/security/wnpa-sec-2026-04.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994484?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1"},{"url":"http://public2.vulnerablecode.io/api/packages/994485?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}],"aliases":["CVE-2026-0960"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqn1-t4m4-wben"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1"}