Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.8.4 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2013-2487
epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x prior to 1.8.6 uses incorrect integer data types, which allows remote malicious users to cause a denial of service (infinite loop) via crafted integer values in a pack...
Opensuse Opensuse 11.4
Opensuse Opensuse 12.1
Opensuse Opensuse 12.2
Opensuse Opensuse 12.3
Debian Debian Linux 7.0
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.5
2.9
CVSSv2
CVE-2013-1576
The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly process crypto-suite parameters, which allows remote malicious users to cause a denial of service (infinite ...
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.4
2.9
CVSSv2
CVE-2013-1589
Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.0
2.9
CVSSv2
CVE-2013-1577
The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote malicious users to cause a...
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
2.9
CVSSv2
CVE-2013-1581
The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly handle fragment gaps, which allows remote malicious users to cause a denial of service (loop) via a m...
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
2.9
CVSSv2
CVE-2013-1574
The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 uses an incorrect data type for a counter variable, which allows remote malicious users to cause a denial of ser...
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.4
2.9
CVSSv2
CVE-2013-1580
The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 uses an incorrect data type for a position variable, which allows remote malicious users to cause a denial of servic...
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.0
2.9
CVSSv2
CVE-2013-1582
The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly manage an offset variable, which allows remote malicious users to cause a denial of service (infinite loop or application...
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.4
2.9
CVSSv2
CVE-2013-1584
The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 accesses an inappropriate pointer, which allows remote malicious users to cause a denial of service (application cr...
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
2.9
CVSSv2
CVE-2013-1585
epan/tvbuff.c in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »