Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.4.3 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2011-3360
Untrusted search path vulnerability in Wireshark 1.4.x prior to 1.4.9 and 1.6.x prior to 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
1 EDB exploit
9.3
CVSSv2
CVE-2011-1591
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x prior to 1.4.5 allows remote malicious users to execute arbitrary code via a crafted .pcap file.
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.4
4 EDB exploits
6.8
CVSSv2
CVE-2011-0713
Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 up to and including 1.2.14 and 1.4.0 up to and including 1.4.3 allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Noki...
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.2.7
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.2.11
Wireshark Wireshark 1.2.10
Wireshark Wireshark 1.2.6
Wireshark Wireshark 1.2.8
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.14
Wireshark Wireshark 1.2.3
Wireshark Wireshark 1.2.12
Wireshark Wireshark 1.2.13
Wireshark Wireshark 1.2.5
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2.4
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.2.9
Wireshark Wireshark 1.2.2
Wireshark Wireshark 1.4.1
6.8
CVSSv2
CVE-2011-0538
Wireshark 1.2.0 up to and including 1.2.14, 1.4.0 up to and including 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote malicious users to cause a denial of service (memory corruption) or possibly have uns...
Wireshark Wireshark 1.2.8
Wireshark Wireshark 1.2.7
Wireshark Wireshark 1.2.5
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.5.0
Wireshark Wireshark 1.2.11
Wireshark Wireshark 1.2.14
Wireshark Wireshark 1.2.2
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.2.12
Wireshark Wireshark 1.2.6
Wireshark Wireshark 1.2.4
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2.9
Wireshark Wireshark 1.2.10
Wireshark Wireshark 1.2.13
Wireshark Wireshark 1.2.3
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.2
1 EDB exploit
5.8
CVSSv2
CVE-2012-0043
Buffer overflow in the reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.4.x prior to 1.4.11 and 1.6.x prior to 1.6.5 allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code vi...
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
5
CVSSv2
CVE-2012-1596
The mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector in Wireshark 1.4.x prior to 1.4.12 and 1.6.x prior to 1.6.6 allows remote malicious users to cause a denial of service (application crash) via a packet containing an invalid pointe...
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.11
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
5
CVSSv2
CVE-2011-1142
Stack consumption vulnerability in the dissect_ber_choice function in the BER dissector in Wireshark 1.2.x up to and including 1.2.15 and 1.4.x up to and including 1.4.4 might allow remote malicious users to cause a denial of service (infinite loop) via vectors involving self-ref...
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.2.7
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.2.11
Wireshark Wireshark 1.2.10
Wireshark Wireshark 1.2.6
Wireshark Wireshark 1.2.8
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.2.15
Wireshark Wireshark 1.2.14
Wireshark Wireshark 1.2.3
Wireshark Wireshark 1.2.12
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.2.13
Wireshark Wireshark 1.2.5
Wireshark Wireshark 1.2.1
Wireshark Wireshark 1.2.4
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.2.9
Wireshark Wireshark 1.2.2
Wireshark Wireshark 1.4.1
4.3
CVSSv2
CVE-2012-0066
Wireshark 1.4.x prior to 1.4.11 and 1.6.x prior to 1.6.5 allows remote malicious users to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.0
Redhat Enterprise Linux 5
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.6
4.3
CVSSv2
CVE-2012-0041
The dissect_packet function in epan/packet.c in Wireshark 1.4.x prior to 1.4.11 and 1.6.x prior to 1.6.5 allows remote malicious users to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Redhat Enterprise Linux 5
4.3
CVSSv2
CVE-2012-0067
wiretap/iptrace.c in Wireshark 1.4.x prior to 1.4.11 and 1.6.x prior to 1.6.5 allows remote malicious users to cause a denial of service (application crash) via a long packet in an AIX iptrace file.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
Redhat Enterprise Linux 5
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »