Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.8.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2012-6052
Wireshark 1.8.x prior to 1.8.4 allows remote malicious users to obtain sensitive hostname information by reading pcap-ng files.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
5
CVSSv2
CVE-2012-6053
epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 relies on a length field to calculate an offset value, which allows remote malicious users to cause a denial of service (infinite loop) via a zero value for this field.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
5
CVSSv2
CVE-2012-6057
The dissect_eigrp_metric_comm function in epan/dissectors/packet-eigrp.c in the EIGRP dissector in Wireshark 1.8.x prior to 1.8.4 uses the wrong data type for a certain offset value, which allows remote malicious users to cause a denial of service (integer overflow and infinite l...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
5
CVSSv2
CVE-2012-6056
Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
5
CVSSv2
CVE-2012-6059
The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote malicious users to cause a denial of s...
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
5
CVSSv2
CVE-2012-6061
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data type for a certain length field, which allows remote malicious users to cause a denial of service (integer overf...
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
5
CVSSv2
CVE-2012-6054
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x prior to 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote malicious users to cause a denial of service (in...
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.3
5
CVSSv2
CVE-2012-6055
epan/dissectors/packet-3g-a11.c in the 3GPP2 A11 dissector in Wireshark 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a zero value in a sub-type length field.
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
5
CVSSv2
CVE-2012-6058
Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted Number of Sources value.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
5
CVSSv2
CVE-2012-6060
Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a malformed packet.
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »