Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2016-5357 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5356 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5355 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5354 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5353 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5352 Low Aug 7, 2016 == 2.0.0
== 2.0.1
== 2.0.2
== 2.0.3
CVE-2016-5351 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-5350 Low Aug 7, 2016 == 2.0.0
== 1.12.4
== 1.12.10
== 1.12.5
== 1.12.0
== 1.12.9
== 2.0.1
== 1.12.2
== 2.0.2
== 2.0.3
== 1.12.1
== 1.12.7
== 1.12.11
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2016-6513 Low Aug 6, 2016 == 2.0.0
== 2.0.4
== 2.0.1
== 2.0.2
== 2.0.3
CVE-2016-6512 Low Aug 6, 2016 == 2.0.0
== 2.0.4
== 2.0.1
== 2.0.2
== 2.0.3