Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2011-0444 High Jan 13, 2011 == 1.2.7
== 1.2.11
== 1.2.10
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.12
== 1.2.13
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2
== 1.2.9
== 1.2.2
== 1.4.2
== 1.4.0
== 1.4.1
CVE-2011-0445 Medium Jan 13, 2011 == 1.4.2
== 1.4.0
== 1.4.1
CVE-2010-4538 High Jan 7, 2011 == 1.4.2
CVE-2010-3445 Medium Nov 26, 2010 == 1.2.7
== 1.4.0
== 1.2.11
== 1.2.10
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.9
== 1.2.2
CVE-2010-4300 High Nov 26, 2010 == 1.2.7
== 1.4.0
== 1.2.11
== 1.2.10
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.12
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.9
== 1.2.2
== 1.4.1
CVE-2010-4301 Medium Nov 26, 2010 == 1.4.0
== 1.4.1
CVE-2010-3133 High Aug 26, 2010 == 0.99.8
== 1.2.7
== 0.99.3
== 1.0.9
<= 1.2.10
== 1.2.6
== 1.2.8
== 1.0.1
== 1.2.0
== 1.2.3
== 0.99.6
== 1.0.2
== 0.99.2
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.2.5
== 1.2.1
== 1.0.12
== 1.0.8
== 1.0.5
== 1.2.4
== 0.99.5
== 1.2.9
== 1.2.2
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
CVE-2010-2992 Medium Aug 13, 2010 == 1.2.7
== 1.2.6
== 1.2.8
== 1.2.3
== 1.2.5
== 1.2.4
== 1.2.9
== 1.2.2
CVE-2010-2993 Medium Aug 13, 2010 == 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2
== 1.2.9
== 1.2.2
CVE-2010-2994 High Aug 13, 2010 == 1.2.7
== 1.0.13
== 1.0.9
== 1.2.6
== 1.2.8
== 1.0.1
== 0.10.14
== 1.2.0
== 1.2.3
== 1.0
== 1.0.2
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.2.5
== 0.10.13
== 1.2.1
== 1.0.12
== 1.0.8
== 1.0.5
== 1.2.4
== 1.2
== 1.2.9
== 1.2.2
== 1.0.0
== 1.0.11
== 1.0.7