Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.2.0 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2009-2560
Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote malicious users to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was late...
Wireshark Wireshark 1.0.9
Wireshark Wireshark 1.0.1
Wireshark Wireshark 1.2.0
Wireshark Wireshark 1.0.2
Wireshark Wireshark 1.0.4
Wireshark Wireshark 1.0.3
Wireshark Wireshark 1.0.6
Wireshark Wireshark 1.0.8
Wireshark Wireshark 1.0.5
Wireshark Wireshark 1.0.0
Wireshark Wireshark 1.0.7
445
VMScore
CVE-2009-2562
Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 up to and including 1.2.0 allows remote malicious users to cause a denial of service (crash) via unknown vectors.
Wireshark Wireshark 0.99.8
Wireshark Wireshark 0.9.10
Wireshark Wireshark 0.9.2
Wireshark Wireshark 0.99.3
Wireshark Wireshark 0.9.14
Wireshark Wireshark 0.99.0
Wireshark Wireshark 1.0.1
Wireshark Wireshark 1.2.0
Wireshark Wireshark 0.9.8
Wireshark Wireshark 0.9.5
Wireshark Wireshark 0.10.9
Wireshark Wireshark 1.0
Wireshark Wireshark 0.9.6
Wireshark Wireshark 0.99.6
Wireshark Wireshark 1.0.2
Wireshark Wireshark 0.99.2
Wireshark Wireshark 0.99.1
Wireshark Wireshark 1.0.4
Wireshark Wireshark 1.0.3
Wireshark Wireshark 1.0.6
Wireshark Wireshark 1.0.8
Wireshark Wireshark 1.0.5
445
VMScore
CVE-2009-2561
Unspecified vulnerability in the sFlow dissector in Wireshark 1.2.0 allows remote malicious users to cause a denial of service (CPU and memory consumption) via unspecified vectors.
Wireshark Wireshark 1.2.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6280
CVE-2024-5346
CVE-2024-30078
CVE-2022-45803
CVE-2024-36886
SQL
CVE-2024-24553
IMAP
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5