Vulnerability Database

With exploit

wireshark / wireshark

Title Severity Exploit Date Affected Version
CVE-2010-2995 High Aug 13, 2010 == 1.2.7
== 1.0.13
== 1.0.9
== 1.2.6
== 1.2.8
== 1.0.1
== 0.10.14
== 1.2.0
== 0.10.9
== 1.2.3
== 0.10.8
== 1.0.2
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.2.5
== 0.10.13
== 1.2.1
== 1.0.12
== 0.10.12
== 0.10.10
== 1.0.8
== 1.0.5
== 1.2.4
== 1.2
== 1.2.9
== 0.10.11
== 1.2.2
== 1.0.0
== 1.0.11
== 1.0.14
== 1.0.7
CVE-2010-2283 Low Jun 15, 2010 == 0.99.8
== 1.0.13
== 1.0.9
== 1.0.1
== 0.99.6
== 1.0.2
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.0.12
== 1.0.8
== 1.0.5
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-2284 High Jun 15, 2010 == 0.99.8
== 1.0.13
== 0.99.3
== 0.99.0
== 1.0.9
== 1.0.1
== 0.10.14
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 0.10.13
== 1.0.12
== 1.0.8
== 1.0.5
== 0.99.5
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-2285 Low Jun 15, 2010 == 0.99.8
== 1.0.13
== 0.99.3
== 0.99.0
== 1.0.9
== 1.0.1
== 0.10.14
== 0.8.20
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 0.10.13
== 1.0.12
== 1.0.8
== 1.0.5
== 0.99.5
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-2286 Low Jun 15, 2010 == 0.99.8
== 1.0.13
== 0.99.3
== 0.99.0
== 1.0.9
== 1.0.1
== 0.10.14
== 0.8.20
== 0.10.9
== 0.10.7
== 0.10.8
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 0.10.13
== 1.0.12
== 0.10.12
== 0.10.10
== 1.0.8
== 1.0.5
== 0.99.5
== 0.10.11
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-2287 High Jun 15, 2010 == 0.99.8
== 1.0.13
== 0.99.3
== 0.99.0
== 1.0.9
== 1.0.1
== 0.10.14
== 0.10.9
== 0.10.8
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 0.10.13
== 1.0.12
== 0.10.12
== 0.10.10
== 1.0.8
== 1.0.5
== 0.99.5
== 0.10.11
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.8
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-1455 Low May 12, 2010 == 0.99.8
== 0.99.3
== 0.99.0
== 1.0.9
== 1.0.1
== 0.9.6
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.0.12
== 1.0.8
== 1.0.5
== 0.99.5
== 0.99.4
== 1.0.0
== 1.0.11
== 0.99.7
== 1.0.7
== 1.2.7
== 1.2.6
== 1.2.0
== 1.2.3
== 1.2.5
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2010-0304 High Feb 3, 2010 == 1.0.9
== 1.0.1
== 1.2.0
== 1.2.3
== 1.0
== 1.0.2
== 1.0.4
== 1.0.3
== 1.0.6
== 1.0.10
== 1.2.5
== 1.2.1
== 1.0.8
== 1.0.5
== 1.2.4
== 1.2
== 1.2.2
== 1.0.0
== 0.9.15
== 1.0.7
CVE-2009-4376 High Dec 21, 2009 == 1.2.0
== 1.2.3
== 1.2.1
== 1.2.4
== 1.2.2
CVE-2009-4377 Low Dec 21, 2009 == 0.99.9
== 0.99.8
== 0.9.10
== 0.9.2
== 0.99.3
== 0.9.14
== 0.99.0
== 1.0.9
== 1.0.1
== 1.2.0
== 0.9.8
== 0.9.5
== 1.2.3
== 1.0
== 0.9.6
== 0.99.6
== 1.0.2
== 0.99.2
== 0.99.1
== 1.0.4
== 1.0.3
== 1.0.6
== 1.2.1
== 1.0.8
== 1.0.5
== 1.2.4
== 0.99.5
== 1.2
== 1.2.2
== 0.99.4
== 1.0.0
== 0.99.6a
== 0.99
== 0.99.7
== 1.0.7
== 0.9.7