Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.6.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-1594
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x prior to 1.6.6 allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.3
NA
CVE-2012-4297
Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x prior to 1.6.10 and 1.8.x prior to 1.8.2 allows remote malicious users to execute arbitrary code via a malformed packet.
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Sun Sunos 5.11
NA
CVE-2012-3548
The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x up to and including 1.6.10 and 1.8.x up to and including 1.8.2 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
NA
CVE-2012-6053
epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 relies on a length field to calculate an offset value, which allows remote malicious users to cause a denial of service (infinite loop) via a zero value for this field.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
NA
CVE-2012-6060
Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a malformed packet.
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
NA
CVE-2012-6062
The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
NA
CVE-2012-6058
Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted Number of Sources value.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
NA
CVE-2012-6059
The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote malicious users to cause a denial of s...
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
NA
CVE-2012-6061
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data type for a certain length field, which allows remote malicious users to cause a denial of service (integer overf...
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
NA
CVE-2013-1572
The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x prior to 1.6.13 and 1.8.x prior to 1.8.5 does not properly handle certain short lengths, which allows remote malicious users to c...
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.12
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.4
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »