Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2012-4290 Low Aug 16, 2012 == 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.8.1
== 1.8.0
CVE-2012-4291 Low Aug 16, 2012 == 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.8.1
== 1.8.0
CVE-2012-4292 Low Aug 16, 2012 == 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.8.1
== 1.8.0
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
CVE-2012-4293 Low Aug 16, 2012 == 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.8.1
== 1.8.0
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
CVE-2012-4294 Medium Aug 16, 2012 == 1.8.0
== 1.8.1
CVE-2012-4295 Low Aug 16, 2012 == 1.8.0
== 1.8.1
CVE-2012-4296 Low Aug 16, 2012 == 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
== 1.8.1
== 1.8.0
CVE-2012-4297 High Aug 16, 2012 == 1.8.1
== 1.8.0
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
CVE-2012-4298 Medium Aug 16, 2012 == 1.8.0
== 1.8.1
CVE-2012-4048 Low Jul 24, 2012 == 1.4.8
== 1.4.0
== 1.4.7
== 1.4.6
== 1.4.11
== 1.4.2
== 1.4.5
== 1.4.13
== 1.4.10
== 1.4.3
== 1.4.1
== 1.4.12
== 1.4.9
== 1.4.4
== 1.8.0
== 1.6.0
== 1.6.5
== 1.6.2
== 1.6.8
== 1.6.4
== 1.6.7
== 1.6.3
== 1.6.1
== 1.6.6