Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireshark wireshark 1.6.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-4100
The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x prior to 1.6.3 does not initialize a certain variable, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.2
NA
CVE-2012-1594
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x prior to 1.6.6 allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.3
NA
CVE-2011-4101
The dissect_infiniband_common function in epan/dissectors/packet-infiniband.c in the Infiniband dissector in Wireshark 1.4.0 up to and including 1.4.9 and 1.6.x prior to 1.6.3 allows remote malicious users to cause a denial of service (NULL pointer dereference and application cra...
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
NA
CVE-2011-4102
Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 up to and including 1.4.9 and 1.6.x prior to 1.6.3 allows remote malicious users to cause a denial of service (application crash) via a malformed file.
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.8
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.0
NA
CVE-2012-4297
Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x prior to 1.6.10 and 1.8.x prior to 1.8.2 allows remote malicious users to execute arbitrary code via a malformed packet.
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.2
Sun Sunos 5.11
NA
CVE-2012-3548
The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x up to and including 1.6.10 and 1.8.x up to and including 1.8.2 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field...
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
NA
CVE-2012-6058
Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted Number of Sources value.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
NA
CVE-2012-6059
The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote malicious users to cause a denial of s...
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
NA
CVE-2012-6061
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data type for a certain length field, which allows remote malicious users to cause a denial of service (integer overf...
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.8.2
NA
CVE-2012-6062
The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.8.2
Wireshark Wireshark 1.8.3
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.8.0
Wireshark Wireshark 1.8.1
Wireshark Wireshark 1.6.10
Wireshark Wireshark 1.6.11
Wireshark Wireshark 1.6.8
Wireshark Wireshark 1.6.9
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.6.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »