Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-v4qg-v1vm-dbgh
Summarysecurity flaw
Aliases
0
alias CVE-2006-4574
Fixed_packages
0
url pkg:deb/debian/wireshark@0.99.4-1?distro=trixie
purl pkg:deb/debian/wireshark@0.99.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0.99.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ra8-e2ag-cuh9
1
vulnerability VCID-7cgx-1cxn-7bdk
2
vulnerability VCID-7m5n-82x7-vfen
3
vulnerability VCID-gqrh-exr5-pbfe
4
vulnerability VCID-m2de-ys7x-6qdp
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-u4yz-db9x-kkck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-114w-j43h-p3ek
1
vulnerability VCID-2pgm-khz1-auay
2
vulnerability VCID-9jam-asdr-cyec
3
vulnerability VCID-kdgd-xdqb-9khz
4
vulnerability VCID-m58x-8cam-3fdy
5
vulnerability VCID-mb3r-da54-7kfk
6
vulnerability VCID-mnuz-t2nj-nfh5
7
vulnerability VCID-qs6k-my1v-8qh4
8
vulnerability VCID-r54z-8gcg-pqg7
9
vulnerability VCID-ra98-yk72-bkfq
10
vulnerability VCID-shbm-pwte-rkgt
11
vulnerability VCID-wqn1-t4m4-wben
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
purl pkg:deb/debian/wireshark@4.6.4-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ra8-e2ag-cuh9
1
vulnerability VCID-7m5n-82x7-vfen
2
vulnerability VCID-gqrh-exr5-pbfe
3
vulnerability VCID-m2de-ys7x-6qdp
4
vulnerability VCID-u4yz-db9x-kkck
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/wireshark@0.99.4-AS21?arch=1
purl pkg:rpm/redhat/wireshark@0.99.4-AS21?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b7j-h8k4-qyed
1
vulnerability VCID-ebjz-3gr1-6yam
2
vulnerability VCID-px3m-hswu-fqdv
3
vulnerability VCID-v4qg-v1vm-dbgh
4
vulnerability VCID-x9cp-2dwn-u7f1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-AS21%3Farch=1
1
url pkg:rpm/redhat/wireshark@0.99.4-EL3?arch=1
purl pkg:rpm/redhat/wireshark@0.99.4-EL3?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b7j-h8k4-qyed
1
vulnerability VCID-ebjz-3gr1-6yam
2
vulnerability VCID-px3m-hswu-fqdv
3
vulnerability VCID-v4qg-v1vm-dbgh
4
vulnerability VCID-x9cp-2dwn-u7f1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-EL3%3Farch=1
2
url pkg:rpm/redhat/wireshark@0.99.4-EL4?arch=1
purl pkg:rpm/redhat/wireshark@0.99.4-EL4?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4b7j-h8k4-qyed
1
vulnerability VCID-ebjz-3gr1-6yam
2
vulnerability VCID-px3m-hswu-fqdv
3
vulnerability VCID-v4qg-v1vm-dbgh
4
vulnerability VCID-x9cp-2dwn-u7f1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-EL4%3Farch=1
References
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4574.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4574.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4574
reference_id
reference_type
scores
0
value 0.06819
scoring_system epss
scoring_elements 0.9129
published_at 2026-04-02T12:55:00Z
1
value 0.06819
scoring_system epss
scoring_elements 0.91333
published_at 2026-04-11T12:55:00Z
2
value 0.06819
scoring_system epss
scoring_elements 0.91285
published_at 2026-04-01T12:55:00Z
3
value 0.06819
scoring_system epss
scoring_elements 0.91301
published_at 2026-04-04T12:55:00Z
4
value 0.06819
scoring_system epss
scoring_elements 0.91368
published_at 2026-04-29T12:55:00Z
5
value 0.06819
scoring_system epss
scoring_elements 0.91369
published_at 2026-04-24T12:55:00Z
6
value 0.06819
scoring_system epss
scoring_elements 0.9136
published_at 2026-04-21T12:55:00Z
7
value 0.06819
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-18T12:55:00Z
8
value 0.06819
scoring_system epss
scoring_elements 0.91308
published_at 2026-04-07T12:55:00Z
9
value 0.06819
scoring_system epss
scoring_elements 0.9132
published_at 2026-04-08T12:55:00Z
10
value 0.06819
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-16T12:55:00Z
11
value 0.06819
scoring_system epss
scoring_elements 0.91334
published_at 2026-04-13T12:55:00Z
12
value 0.06819
scoring_system epss
scoring_elements 0.91335
published_at 2026-04-12T12:55:00Z
13
value 0.06819
scoring_system epss
scoring_elements 0.91326
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4574
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574
4
reference_url http://secunia.com/advisories/22590
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22590
5
reference_url http://secunia.com/advisories/22659
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22659
6
reference_url http://secunia.com/advisories/22672
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22672
7
reference_url http://secunia.com/advisories/22692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22692
8
reference_url http://secunia.com/advisories/22797
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22797
9
reference_url http://secunia.com/advisories/22841
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22841
10
reference_url http://secunia.com/advisories/22929
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/22929
11
reference_url http://secunia.com/advisories/23096
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://secunia.com/advisories/23096
12
reference_url http://securitytracker.com/id?1017129
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://securitytracker.com/id?1017129
13
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/29844
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/29844
14
reference_url https://issues.rpath.com/browse/RPL-746
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url https://issues.rpath.com/browse/RPL-746
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740
16
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm
17
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:195
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:195
18
reference_url http://www.novell.com/linux/security/advisories/2006_65_ethereal.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.novell.com/linux/security/advisories/2006_65_ethereal.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2006-0726.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.redhat.com/support/errata/RHSA-2006-0726.html
20
reference_url http://www.securityfocus.com/archive/1/450307/100/0/threaded
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.securityfocus.com/archive/1/450307/100/0/threaded
21
reference_url http://www.securityfocus.com/bid/20762
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.securityfocus.com/bid/20762
22
reference_url http://www.us.debian.org/security/2006/dsa-1201
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.us.debian.org/security/2006/dsa-1201
23
reference_url http://www.vupen.com/english/advisories/2006/4220
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.vupen.com/english/advisories/2006/4220
24
reference_url http://www.wireshark.org/security/wnpa-sec-2006-03.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/
url http://www.wireshark.org/security/wnpa-sec-2006-03.html
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618197
reference_id 1618197
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618197
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396258
reference_id 396258
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396258
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-4574
reference_id CVE-2006-4574
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2006-4574
29
reference_url https://access.redhat.com/errata/RHSA-2006:0726
reference_id RHSA-2006:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0726
Weaknesses
0
cwe_id 193
name Off-by-one Error
description A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
1
cwe_id 617
name Reachable Assertion
description The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Exploits
Severity_range_score5.0 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-v4qg-v1vm-dbgh