Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2013-2478 Low Mar 7, 2013 == 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-2479 Low Mar 7, 2013 == 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
CVE-2013-2480 Low Mar 7, 2013 == 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
== 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
CVE-2013-2481 Low Mar 7, 2013 == 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
== 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
CVE-2013-2482 Medium Mar 7, 2013 == 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
== 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
CVE-2013-2483 Low Mar 7, 2013 == 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-2484 Low Mar 7, 2013 == 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-2485 Medium Mar 7, 2013 == 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
CVE-2013-2486 Medium Mar 7, 2013 == 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
CVE-2013-2487 High Mar 7, 2013 == 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5