Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 313,825
With exploit
wireshark / wireshark
You can search for specific versions with
https://synscan.net/product/wireshark/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2013-5721
Low
Sep 16, 2013
== 1.8.6
== 1.8.2
== 1.8.9
== 1.8.3
== 1.10.0
== 1.8.1
== 1.10.1
== 1.8.7
== 1.8.0
== 1.8.4
== 1.8.5
== 1.8.8
CVE-2013-4074
Medium
Jun 9, 2013
== 1.6.0
== 1.6.12
== 1.6.15
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.14
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.6
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.7
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-3557
Medium
May 25, 2013
== 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.14
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.6
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-3559
Medium
May 25, 2013
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
CVE-2013-3560
Medium
May 25, 2013
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
CVE-2013-3562
Medium
May 25, 2013
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
CVE-2013-3555
Medium
May 25, 2013
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
CVE-2012-6058
Medium
Dec 5, 2012
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
CVE-2012-6059
Medium
Dec 5, 2012
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
CVE-2012-6060
Medium
Dec 5, 2012
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
‹
›
‹
1
2
...
14
15
16
...
20
21
›