Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.6.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-4100
The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x prior to 1.6.3 does not initialize a certain variable, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.2
NA
CVE-2012-1594
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x prior to 1.6.6 allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.3
NA
CVE-2011-4102
Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 up to and including 1.4.9 and 1.6.x prior to 1.6.3 allows remote malicious users to cause a denial of service (application crash) via a malformed file.
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.0
NA
CVE-2011-4101
The dissect_infiniband_common function in epan/dissectors/packet-infiniband.c in the Infiniband dissector in Wireshark 1.4.0 up to and including 1.4.9 and 1.6.x prior to 1.6.3 allows remote malicious users to cause a denial of service (NULL pointer dereference and application cra...
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
NA
CVE-2012-4297
Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x prior to 1.6.10 and 1.8.x prior to 1.8.2 allows remote malicious users to execute arbitrary code via a malformed packet.
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Sun Sunos 5.11
NA
CVE-2012-3548
The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x up to and including 1.6.10 and 1.8.x up to and including 1.8.2 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
NA
CVE-2012-6053
epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 relies on a length field to calculate an offset value, which allows remote malicious users to cause a denial of service (infinite loop) via a zero value for this field.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
NA
CVE-2012-6058
Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted Number of Sources value.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
NA
CVE-2012-6059
The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote malicious users to cause a denial of s...
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
NA
CVE-2012-6060
Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a malformed packet.
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »