{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88799?format=json","vulnerability_id":"VCID-v4qg-v1vm-dbgh","summary":"security flaw","aliases":[{"alias":"CVE-2006-4574"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942735?format=json","purl":"pkg:deb/debian/wireshark@0.99.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@0.99.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942729?format=json","purl":"pkg:deb/debian/wireshark@3.4.10-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2ra8-e2ag-cuh9"},{"vulnerability":"VCID-7cgx-1cxn-7bdk"},{"vulnerability":"VCID-7m5n-82x7-vfen"},{"vulnerability":"VCID-gqrh-exr5-pbfe"},{"vulnerability":"VCID-m2de-ys7x-6qdp"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-u4yz-db9x-kkck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@3.4.10-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942727?format=json","purl":"pkg:deb/debian/wireshark@4.0.17-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-114w-j43h-p3ek"},{"vulnerability":"VCID-2pgm-khz1-auay"},{"vulnerability":"VCID-9jam-asdr-cyec"},{"vulnerability":"VCID-kdgd-xdqb-9khz"},{"vulnerability":"VCID-m58x-8cam-3fdy"},{"vulnerability":"VCID-mb3r-da54-7kfk"},{"vulnerability":"VCID-mnuz-t2nj-nfh5"},{"vulnerability":"VCID-qs6k-my1v-8qh4"},{"vulnerability":"VCID-r54z-8gcg-pqg7"},{"vulnerability":"VCID-ra98-yk72-bkfq"},{"vulnerability":"VCID-shbm-pwte-rkgt"},{"vulnerability":"VCID-wqn1-t4m4-wben"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.0.17-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942731?format=json","purl":"pkg:deb/debian/wireshark@4.4.14-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.4.14-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942730?format=json","purl":"pkg:deb/debian/wireshark@4.6.4-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2ra8-e2ag-cuh9"},{"vulnerability":"VCID-7m5n-82x7-vfen"},{"vulnerability":"VCID-gqrh-exr5-pbfe"},{"vulnerability":"VCID-m2de-ys7x-6qdp"},{"vulnerability":"VCID-u4yz-db9x-kkck"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wireshark@4.6.4-1%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/130010?format=json","purl":"pkg:rpm/redhat/wireshark@0.99.4-AS21?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4b7j-h8k4-qyed"},{"vulnerability":"VCID-ebjz-3gr1-6yam"},{"vulnerability":"VCID-px3m-hswu-fqdv"},{"vulnerability":"VCID-v4qg-v1vm-dbgh"},{"vulnerability":"VCID-x9cp-2dwn-u7f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-AS21%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/130008?format=json","purl":"pkg:rpm/redhat/wireshark@0.99.4-EL3?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4b7j-h8k4-qyed"},{"vulnerability":"VCID-ebjz-3gr1-6yam"},{"vulnerability":"VCID-px3m-hswu-fqdv"},{"vulnerability":"VCID-v4qg-v1vm-dbgh"},{"vulnerability":"VCID-x9cp-2dwn-u7f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-EL3%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/130009?format=json","purl":"pkg:rpm/redhat/wireshark@0.99.4-EL4?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4b7j-h8k4-qyed"},{"vulnerability":"VCID-ebjz-3gr1-6yam"},{"vulnerability":"VCID-px3m-hswu-fqdv"},{"vulnerability":"VCID-v4qg-v1vm-dbgh"},{"vulnerability":"VCID-x9cp-2dwn-u7f1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wireshark@0.99.4-EL4%3Farch=1"}],"references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4574.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4574","reference_id":"","reference_type":"","scores":[{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.9129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91369","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.9136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91358","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.9132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91334","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91335","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06819","scoring_system":"epss","scoring_elements":"0.91326","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574"},{"reference_url":"http://secunia.com/advisories/22590","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22590"},{"reference_url":"http://secunia.com/advisories/22659","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22659"},{"reference_url":"http://secunia.com/advisories/22672","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22672"},{"reference_url":"http://secunia.com/advisories/22692","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22692"},{"reference_url":"http://secunia.com/advisories/22797","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22797"},{"reference_url":"http://secunia.com/advisories/22841","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22841"},{"reference_url":"http://secunia.com/advisories/22929","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/22929"},{"reference_url":"http://secunia.com/advisories/23096","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://secunia.com/advisories/23096"},{"reference_url":"http://securitytracker.com/id?1017129","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://securitytracker.com/id?1017129"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29844","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/29844"},{"reference_url":"https://issues.rpath.com/browse/RPL-746","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"https://issues.rpath.com/browse/RPL-746"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9740"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:195","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:195"},{"reference_url":"http://www.novell.com/linux/security/advisories/2006_65_ethereal.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.novell.com/linux/security/advisories/2006_65_ethereal.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0726.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2006-0726.html"},{"reference_url":"http://www.securityfocus.com/archive/1/450307/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.securityfocus.com/archive/1/450307/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/20762","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.securityfocus.com/bid/20762"},{"reference_url":"http://www.us.debian.org/security/2006/dsa-1201","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.us.debian.org/security/2006/dsa-1201"},{"reference_url":"http://www.vupen.com/english/advisories/2006/4220","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.vupen.com/english/advisories/2006/4220"},{"reference_url":"http://www.wireshark.org/security/wnpa-sec-2006-03.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-17T14:05:23Z/"}],"url":"http://www.wireshark.org/security/wnpa-sec-2006-03.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618197","reference_id":"1618197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618197"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396258","reference_id":"396258","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396258"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4574","reference_id":"CVE-2006-4574","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-4574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0726","reference_id":"RHSA-2006:0726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0726"}],"weaknesses":[{"cwe_id":193,"name":"Off-by-one Error","description":"A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value."},{"cwe_id":617,"name":"Reachable Assertion","description":"The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary."}],"exploits":[],"severity_range_score":"5.0 - 7.5","exploitability":"0.5","weighted_severity":"6.8","risk_score":3.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4qg-v1vm-dbgh"}