Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2015-8717 Medium Jan 4, 2016 == 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8718 Medium Jan 4, 2016 == 2.0.0
== 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8719 Medium Jan 4, 2016 == 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8720 Medium Jan 4, 2016 == 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8721 Medium Jan 4, 2016 == 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8722 Medium Jan 4, 2016 == 2.0.0
== 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8723 Medium Jan 4, 2016 == 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8724 Medium Jan 4, 2016 == 2.0.0
== 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8725 Medium Jan 4, 2016 == 2.0.0
== 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8
CVE-2015-8726 Medium Jan 4, 2016 == 2.0.0
== 1.12.4
== 1.12.5
== 1.12.0
== 1.12.2
== 1.12.1
== 1.12.7
== 1.12.6
== 1.12.3
== 1.12.8