wireshark vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wireshark package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-4853

*
  • L
CVE-2024-4855

*
  • L
CVE-2024-4854

*
  • L
CVE-2024-2955

*
  • L
Uncontrolled Recursion

*
  • L
Uncontrolled Recursion

*
  • L
NULL Pointer Dereference

*
  • M
Arbitrary Code Injection

<4.0.11-1~deb12u1
  • L
CVE-2023-6175

<4.0.11-1~deb12u1
  • M
Allocation of Resources Without Limits or Throttling

<4.0.11-1~deb12u1
  • M
Divide By Zero

<4.0.11-1~deb12u1
  • H
Uncontrolled Recursion

<4.0.11-1~deb12u1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.0.11-1~deb12u1
  • H
Memory Leak

<4.0.11-1~deb12u1
  • M
CVE-2023-3648

<4.0.11-1~deb12u1
  • M
Out-of-bounds Read

<4.0.11-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.0.6-1~deb12u1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Out-of-bounds Write

<4.0.6-1~deb12u1
  • M
Resource Exhaustion

<4.0.6-1~deb12u1
  • M
Excessive Iteration

<4.0.6-1~deb12u1
  • H
Resource Exhaustion

<4.0.6-1~deb12u1
  • H
CVE-2023-1161

<4.0.6-1~deb12u1
  • M
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Excessive Iteration

<4.0.3-1
  • H
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Improper Resource Shutdown or Release

<4.0.3-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.0.2-1
  • M
Resource Exhaustion

<4.0.2-1
  • H
Out-of-bounds Write

<4.0.0-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.8-1
  • M
Excessive Iteration

<3.6.2-1
  • H
Out-of-bounds Write

<3.6.2-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.2-1
  • C
NULL Pointer Dereference

<3.6.2-1
  • H
Use After Free

<3.6.2-1
  • H
Excessive Iteration

<3.6.2-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.2-1
  • M
Out-of-bounds Read

<3.6.2-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.2-1
  • H
NULL Pointer Dereference

<3.6.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.2-1
  • H
Out-of-bounds Read

<3.6.2-1
  • H
Excessive Iteration

<3.6.0-1
  • H
NULL Pointer Dereference

<3.6.0-1
  • H
Buffer Overflow

<3.6.0-1
  • H
NULL Pointer Dereference

<3.6.0-1
  • H
Buffer Overflow

<3.6.0-1
  • H
NULL Pointer Dereference

<3.6.0-1
  • H
Uncontrolled Recursion

<3.6.0-1
  • H
Buffer Overflow

<3.6.0-1
  • H
Excessive Iteration

<3.6.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.4.7-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.4.7-1
  • M
SQL Injection

<3.4.7-1
  • H
Arbitrary Code Injection

<3.4.4-1
  • H
Resource Exhaustion

<3.4.3-1
  • H
Memory Leak

<3.4.3-1
  • M
Out-of-bounds Read

<3.4.1-1
  • M
Memory Leak

<3.4.1-1
  • M
Memory Leak

<3.4.1-1
  • M
Memory Leak

<3.4.1-1
  • H
Resource Exhaustion

<3.2.8-0.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.2.8-0.1
  • H
NULL Pointer Dereference

<3.2.7-1
  • H
CVE-2020-25863

<3.2.7-1
  • H
Improper Validation of Integrity Check Value

<3.2.7-1
  • M
Double Free

<3.2.6-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.2.5-1
  • L
Resource Exhaustion

<3.2.4-1
  • L
Arbitrary Code Injection

<3.2.3-1
  • H
NULL Pointer Dereference

<3.2.2-1
  • H
Resource Exhaustion

<3.2.2-1
  • H
Improper Input Validation

<3.2.2-1
  • L
Arbitrary Code Injection

<3.2.2-1
  • H
Arbitrary Code Injection

<3.2.1-1
  • M
Arbitrary Code Injection

<3.2.0-1
  • L
Missing Initialization of Resource

<3.0.7-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.0.4-1
  • L
Out-of-Bounds

<2.6.10-1
  • L
Arbitrary Code Injection

<2.6.8-1.1
  • L
Out-of-bounds Write

<2.6.8-1
  • L
Out-of-bounds Read

<2.6.8-1
  • L
NULL Pointer Dereference

<2.6.8-1
  • L
Reachable Assertion

<2.6.8-1
  • L
Improper Input Validation

<2.6.8-1
  • L
Out-of-Bounds

<2.6.8-1
  • M
Out-of-Bounds

<2.6.7-1
  • H
NULL Pointer Dereference

<2.6.7-1
  • H
NULL Pointer Dereference

<2.6.7-1
  • L
Out-of-bounds Read

<2.6.6-1
  • L
Improper Input Validation

<2.6.6-1
  • L
Improper Input Validation

<2.6.6-1
  • L
Use of a Broken or Risky Cryptographic Algorithm

<2.6.6-1
  • M
Use After Free

<2.6.1-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.6.5-1
  • H
Out-of-bounds Write

<2.6.5-1
  • M
NULL Pointer Dereference

<2.6.5-1
  • H
Divide By Zero

<2.6.5-1
  • H
Out-of-bounds Read

<2.6.5-1
  • M
Out-of-bounds Read

<2.6.5-1
  • M
Out-of-bounds Read

<2.6.5-1
  • H
Missing Release of Resource after Effective Lifetime

<2.6.4-1
  • H
NULL Pointer Dereference

<2.6.4-1
  • H
Incorrect Calculation

<2.6.4-1
  • L
CVE-2018-16057

<2.6.3-1
  • L
CVE-2018-16056

<2.6.3-1
  • L
Improper Initialization

<2.6.3-1
  • H
Out-of-bounds Write

<2.6.4-1
  • H
Unchecked Return Value

<2.6.2-1
  • H
Out-of-bounds Read

<2.6.2-1
  • H
Excessive Iteration

<2.6.2-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.6.2-1
  • H
Out-of-bounds Read

<2.6.2-1
  • H
Out-of-bounds Read

<2.6.2-1
  • H
Integer Overflow or Wraparound

<2.6.2-1
  • H
Improper Input Validation

<2.6.2-1
  • H
Integer Overflow or Wraparound

<2.6.2-1
  • H
Improper Input Validation

<2.6.2-1
  • H
NULL Pointer Dereference

<2.6.1-1
  • H
Out-of-Bounds

<2.6.1-1
  • H
Use After Free

<2.6.1-1
  • H
Improper Input Validation

<2.6.1-1
  • H
Out-of-Bounds

<2.6.1-1
  • H
NULL Pointer Dereference

<2.6.1-1
  • H
Out-of-bounds Read

<2.6.1-1
  • L
CVE-2018-9263

<2.4.6-1
  • H
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.6-1
  • H
Excessive Iteration

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Improper Input Validation

<2.4.6-1
  • L
Improper Input Validation

<2.4.6-1
  • H
Out-of-bounds Write

<2.4.6-1
  • H
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Improper Input Validation

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • H
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Improper Input Validation

<2.4.6-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.6-1
  • L
Improper Input Validation

<2.4.6-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Excessive Iteration

<2.4.5-1
  • H
CVE-2018-7335

<2.4.5-1
  • L
Off-by-one Error

<2.4.5-1
  • H
Improper Initialization

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
CVE-2018-7418

<2.4.5-1
  • L
CVE-2018-7337

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.5-1
  • L
Excessive Iteration

<2.4.5-1
  • L
CVE-2018-7417

<2.4.5-1
  • H
CVE-2018-7334

<2.4.5-1
  • H
CVE-2018-7320

<2.4.5-1
  • L
NULL Pointer Dereference

<2.4.5-1
  • L
CVE-2018-7420

<2.4.5-1
  • H
Out-of-Bounds

<2.4.4-1
  • M
Out-of-Bounds

<2.4.4-1
  • M
Out-of-Bounds

<2.4.4-1
  • H
NULL Pointer Dereference

<2.4.0-1
  • H
Out-of-bounds Read

<2.4.4-1
  • H
Improper Check for Unusual or Exceptional Conditions

<2.4.3-1
  • H
Improper Check for Unusual or Exceptional Conditions

<2.4.3-1
  • H
Improper Check for Unusual or Exceptional Conditions

<2.4.3-1
  • L
Use of Externally-Controlled Format String

<2.4.2-1
  • L
CVE-2017-15190

<2.4.2-1
  • L
Missing Release of Resource after Effective Lifetime

<2.4.2-1
  • L
Resource Exhaustion

<2.4.2-1
  • L
CVE-2017-15192

<2.4.2-1
  • H
Out-of-bounds Read

<2.4.1-1
  • H
NULL Pointer Dereference

<2.4.1-1
  • H
Out-of-bounds Write

<2.4.1-1
  • H
Improper Input Validation

<2.4.1-1
  • H
Improper Input Validation

<2.4.0-1
  • H
Improper Input Validation

<2.4.0-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.0-1
  • L
Excessive Iteration

<2.2.0~rc1+g438c022-1
  • L
Improper Input Validation

<2.4.0-1
  • H
Improper Input Validation

<2.4.0-1
  • L
Uncontrolled Recursion

<2.4.0-1
  • L
Uncontrolled Recursion

<2.4.0-1
  • L
Uncontrolled Recursion

<2.4.0-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.7-1
  • L
Divide By Zero

<2.2.7-1
  • L
Improper Input Validation

<2.2.7-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.7-1
  • L
Improper Input Validation

<2.2.7-1
  • L
Out-of-Bounds

<2.2.7-1
  • L
NULL Pointer Dereference

<2.2.7-1
  • H
Out-of-Bounds

<2.2.7-1
  • H
Improper Input Validation

<2.2.7-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.7-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.7-1
  • H
NULL Pointer Dereference

<2.2.7-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • H
Improper Input Validation

<2.2.6+g32dac6a-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.6+g32dac6a-1
  • L
Arbitrary Code Injection

<2.2.6+g32dac6a-1
  • H
Improper Input Validation

<2.2.1+ga6fbd27-1
  • H
Improper Input Validation

<2.2.1+ga6fbd27-1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.5+g440fd4d-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.5+g440fd4d-2
  • H
Improper Input Validation

<2.2.5+g440fd4d-2
  • H
Improper Input Validation

<2.2.5+g440fd4d-2
  • H
Improper Input Validation

<2.2.5+g440fd4d-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.5+g440fd4d-2
  • H
Improper Input Validation

<2.2.5+g440fd4d-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.5+g440fd4d-2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.2.5+g440fd4d-2
  • H
Integer Overflow or Wraparound

<2.2.4+gcc3dc1b-1
  • H
Integer Overflow or Wraparound

<2.2.4+gcc3dc1b-1
  • M
Improper Input Validation

<2.2.2+g9c5aae3-1
  • M
Use After Free

<2.2.2+g9c5aae3-1
  • M
Out-of-Bounds

<2.2.2+g9c5aae3-1
  • M
Improper Input Validation

<2.2.2+g9c5aae3-1
  • M
Resource Management Errors

<2.2.2+g9c5aae3-1
  • M
Out-of-bounds Write

<2.2.0~rc1+g438c022-1
  • M
Out-of-Bounds

<2.2.0~rc1+g438c022-1
  • M
Out-of-bounds Read

<2.2.0~rc1+g438c022-1
  • M
Use After Free

<2.2.0~rc1+g438c022-1
  • M
Out-of-Bounds

<2.2.0~rc1+g438c022-1
  • M
Out-of-Bounds

<2.2.0~rc1+g438c022-1
  • M
NULL Pointer Dereference

<2.0.4+gdd7746e-1
  • M
Out-of-Bounds

<2.0
  • M
Out-of-bounds Read

<2.0.4+gdd7746e-1
  • M
Out-of-Bounds

<2.0.4+gdd7746e-1
  • M
Improper Input Validation

<2.0.4+gdd7746e-1
  • M
Improper Input Validation

<2.0.4+gdd7746e-1
  • M
Improper Input Validation

<2.0.4+gdd7746e-1
  • M
Improper Input Validation

<2.0.4+gdd7746e-1
  • H
Resource Management Errors

<2.0.4+gdd7746e-1
  • M
Improper Input Validation

<2.0.4+gdd7746e-1
  • M
Resource Management Errors

<2.0.5+ga3be9c6-1
  • M
Resource Management Errors

<2.0.5+ga3be9c6-1
  • M
Resource Management Errors

<2.0.5+ga3be9c6-1
  • M
Divide By Zero

<2.0.5+ga3be9c6-1
  • M
NULL Pointer Dereference

<2.0
  • M
Improper Input Validation

<2.0.5+ga3be9c6-1
  • M
Resource Management Errors

<2.0
  • M
Improper Input Validation

<2.0.5+ga3be9c6-1
  • M
Numeric Errors

<2.0.5+ga3be9c6-1
  • M
Resource Management Errors

<2.0.5+ga3be9c6-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Resource Management Errors

<2.0.2+ga16e22e-1
  • L
CVE-2016-4077

<2.0.3+geed34f0-1
  • L
Improper Access Control

<2.0.3+geed34f0-1
  • L
Out-of-Bounds

<2.0.3+geed34f0-1
  • L
Out-of-Bounds

<2.0.3+geed34f0-1
  • L
Improper Input Validation

<2.0.3+geed34f0-1
  • L
CVE-2016-4084

<2.0.3+geed34f0-1
  • L
Out-of-Bounds

<2.0.3+geed34f0-1
  • L
Improper Input Validation

<2.0.3+geed34f0-1
  • L
Out-of-Bounds

<2.0.3+geed34f0-1
  • M
Improper Input Validation

<2.0.0~rc2+g74e5b56-1
  • L
Improper Access Control

<2.0.3+geed34f0-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Resource Management Errors

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Out-of-Bounds

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.2+ga16e22e-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • L
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Out-of-Bounds

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<1.12.0~rc1-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Out-of-Bounds

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Out-of-Bounds

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Out-of-Bounds

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<2.0.1+g59ea380-1
  • M
Improper Input Validation

<1.12.8+g5b6e543-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Improper Input Validation

<1.12.7+g7fc8978-1
  • M
Resource Management Errors

<1.12.6+gee1fce6-1
  • M
Improper Input Validation

<1.12.6+gee1fce6-1
  • M
Numeric Errors

<1.12.5+g5819e5b-1
  • M
Code

<1.12.5+g5819e5b-1
  • H
Resource Management Errors

<1.12.5+g5819e5b-1
  • H
Resource Management Errors

<1.12.5+g5819e5b-1
  • M
Out-of-Bounds

<1.12.5+g5819e5b-1
  • M
Resource Management Errors

<1.12.5+g5819e5b-1
  • M
Out-of-Bounds

<1.12.5+g5819e5b-1
  • H
Numeric Errors

<1.12.5+g5819e5b-1
  • H
Numeric Errors

<1.12.5+g5819e5b-1
  • M
Improper Data Handling

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
Improper Data Handling

<1.12.1+g01b65bf-4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
Improper Data Handling

<1.12.1+g01b65bf-3
  • M
Improper Input Validation

<1.12.1+g01b65bf-3
  • M
CVE-2015-0562

<1.12.1+g01b65bf-3
  • M
CVE-2015-0559

<1.12.1+g01b65bf-3
  • M
Out-of-Bounds

<1.12.1+g01b65bf-3
  • M
Improper Input Validation

<1.12.1+g01b65bf-3
  • M
Out-of-Bounds

<1.12.1+g01b65bf-2
  • M
Resource Management Errors

<1.12.1+g01b65bf-2
  • M
Numeric Errors

<1.12.1+g01b65bf-2
  • M
Resource Management Errors

<1.12.1+g01b65bf-2
  • M
Out-of-Bounds

<1.12.1+g01b65bf-2
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
CVE-2014-6421

<1.12.0~rc1-1
  • M
Improper Input Validation

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Improper Input Validation

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • H
Out-of-Bounds

<1.10.4-1
  • M
Numeric Errors

<1.10.8-1
  • M
CVE-2014-2907

<1.10.7-1
  • M
CVE-2014-2283

<1.10.6-1
  • M
Out-of-Bounds

<1.10.6-1
  • H
Out-of-Bounds

<1.10.6-1
  • M
Improper Input Validation

<1.10.6-1
  • M
Improper Input Validation

<1.10.4-1
  • M
Out-of-Bounds

<1.10.4-1
  • L
Improper Input Validation

<1.10.4-1
  • M
CVE-2013-6337

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • L
Improper Input Validation

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • L
Improper Input Validation

<1.10.2-1
  • M
Improper Input Validation

<1.10.2-1
  • M
Out-of-Bounds

<1.10.2-1
  • M
CVE-2013-5722

<1.10.2-1
  • M
Access Restriction Bypass

<1.10.2-1
  • L
Resource Management Errors

<1.10.2-1
  • M
CVE-2013-4936

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • L
Resource Management Errors

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • L
Numeric Errors

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • M
Resource Management Errors

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • L
Numeric Errors

<1.10.1-1
  • L
Numeric Errors

<1.10.1-1
  • M
Resource Management Errors

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • M
Improper Input Validation

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Numeric Errors

<1.10.0-1
  • M
Improper Input Validation

<1.10.0-1
  • L
Out-of-Bounds

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Resource Management Errors

<1.10.0-1
  • L
Out-of-Bounds

<1.10.0-1
  • L
Out-of-Bounds

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Numeric Errors

<1.8.7-1
  • L
Use of Externally-Controlled Format String

<1.8.7-1
  • L
Out-of-Bounds

<1.8.7-1
  • M
Numeric Errors

<1.8.7-1
  • M
Improper Input Validation

<1.8.7-1
  • M
Numeric Errors

<1.8.7-1
  • L
CVE-2013-2479

<1.8.6-1
  • M
Out-of-Bounds

<1.8.2-5
  • M
Numeric Errors

<1.8.2-5
  • L
Resource Management Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.2-5
  • L
CVE-2013-2485

<1.8.6-1
  • L
Numeric Errors

<1.8.2-5
  • M
CVE-2013-2484

<1.8.2-5
  • M
Improper Input Validation

<1.8.2-5
  • L
Numeric Errors

<1.8.6-1
  • M
CVE-2013-2475

<1.8.2-5
  • L
CVE-2013-2482

<1.8.6-1
  • M
CVE-2013-2480

<1.8.2-5
  • L
Numeric Errors

<1.8.6-1
  • L
Out-of-Bounds

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Cryptographic Issues

<1.8.6-1
  • L
CVE-2013-1587

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Resource Management Errors

<1.8.6-1
  • L
Out-of-Bounds

<1.8.6-1
  • L
Resource Management Errors

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
CVE-2013-1586

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Information Exposure

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • M
Resource Management Errors

<1.8.2-2
  • M
Out-of-Bounds

<1.8.2-2
  • M
CVE-2012-5238

<1.8.2-2
  • L
Resource Management Errors

<1.8.2-2
  • M
Improper Input Validation

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • L
Resource Management Errors

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • L
Improper Input Validation

<1.8.2-1
  • L
Resource Management Errors

<1.8.2-1
  • M
Out-of-Bounds

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • L
Numeric Errors

<1.8.2-1
  • L
Numeric Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • L
Resource Management Errors

<1.8.2-1
  • L
Numeric Errors

<1.8.2-1
  • H
Out-of-Bounds

<1.8.2-1
  • M
Arbitrary Code Injection

<1.8.2-1
  • L
Arbitrary Code Injection

<1.8.2-1
  • L
Out-of-Bounds

<1.6.8-1
  • L
Numeric Errors

<1.6.8-1
  • L
Out-of-Bounds

<1.6.8-1
  • L
Resource Management Errors

<1.6.8-1
  • L
Numeric Errors

<1.6.8-1
  • L
CVE-2012-0042

<1.6.5-1
  • L
Arbitrary Code Injection

<1.6.6-1
  • M
Out-of-Bounds

<1.6.5-1
  • L
Improper Input Validation

<1.6.5-1
  • M
Improper Input Validation

<1.6.5-1
  • L
CVE-2012-1593

<1.6.6-1
  • M
Resource Management Errors

<1.6.6-1
  • L
Improper Input Validation

<1.6.5-1
  • L
Resource Management Errors

<1.6.6-1
  • L
Improper Input Validation

<1.6.5-1
  • M
Resource Management Errors

<1.6.3-1
  • M
Out-of-Bounds

<1.6.3-1
  • L
CVE-2011-4101

<1.6.3-1
  • M
Resource Management Errors

<1.6.2-1
  • M
Out-of-Bounds

<1.6.2-1
  • L
CVE-2011-3360

<1.6.2-1
  • M
Improper Input Validation

<1.6.2-1
  • L
Resource Management Errors

<1.6.2-1
  • L
Numeric Errors

<1.6.1-1
  • L
Resource Management Errors

<1.6.1-1
  • M
Resource Management Errors

<1.6.0-1
  • L
Out-of-Bounds

<1.6.0-1
  • L
Numeric Errors

<1.6.0-1
  • L
CVE-2011-1956

<1.4.6-1
  • L
CVE-2011-1958

<1.6.0-1
  • L
Resource Management Errors

<1.6.0-1
  • H
Out-of-Bounds

<1.4.5-1
  • L
Resource Management Errors

<1.4.5-1
  • H
Out-of-Bounds

<1.2-0-1
  • L
Resource Management Errors

<1.4.4-1
  • L
CVE-2011-1143

<1.4.4-1
  • L
Resource Management Errors

<1.4.4-1
  • L
Resource Management Errors

<1.4.4-1
  • L
Resource Management Errors

<1.4.4-1
  • M
Out-of-Bounds

<1.4.4-1
  • M
Numeric Errors

<1.4.4-1
  • L
Out-of-Bounds

<1.4.3-3
  • C
Out-of-Bounds

<1.2.11-6
  • H
Out-of-Bounds

<1.2.11-6
  • L
Resource Management Errors

<1.2.11-3
  • H
Out-of-Bounds

<1.2.11-4
  • M
CVE-2010-2992

<1.2.10-1
  • C
Numeric Errors

<1.2.10-1
  • C
Out-of-Bounds

<1.2.10-1
  • M
Improper Input Validation

<1.2.10-1
  • H
Out-of-Bounds

<1.2.9-1
  • M
CVE-2010-2285

<1.2.9-1
  • M
Resource Management Errors

<1.2.9-1
  • M
CVE-2010-2283

<1.2.9-1
  • H
Out-of-Bounds

<1.2.9-1
  • L
Improper Input Validation

<1.2.8-1
  • H
Out-of-Bounds

<1.2.6-1
  • H
Out-of-Bounds

<1.2.5-1
  • M
CVE-2009-4377

<1.2.5-1
  • H
Numeric Errors

<1.2.2-1
  • L
Numeric Errors

<1.2.3-1
  • L
Improper Input Validation

<1.2.3-1
  • L
CVE-2009-3550

<1.2.3-1
  • L
CVE-2009-3241

<1.2.2-1
  • L
CVE-2009-3242

<1.2.2-1
  • M
CVE-2009-2560

<1.2.1-1
  • M
Out-of-Bounds

<1.2.1-1
  • M
CVE-2009-2563

<1.2.1-1
  • L
CVE-2009-2562

<1.2.1-1
  • M
CVE-2009-2561

<1.2.1-1
  • L
CVE-2009-1829

<1.0.8-1
  • L
CVE-2009-1269

<1.0.7-1
  • L
Improper Input Validation

<1.0.7-1
  • L
Use of Externally-Controlled Format String

<1.0.7-1
  • L
Resource Management Errors

<1.0.5-1
  • M
Out-of-Bounds

<1.0.6-1
  • M
Improper Input Validation

<1.0.6-1
  • M
Use of Externally-Controlled Format String

<1.0.6-1
  • L
Resource Management Errors

<1.0.5-1
  • L
Improper Input Validation

<1.0.4-1
  • L
Improper Input Validation

<1.0.4-1
  • L
Resource Management Errors

<1.0.4-1
  • L
Resource Management Errors

<1.0.4-1
  • L
Resource Management Errors

<1.0.4-1
  • L
Resource Management Errors

<1.0.4-1
  • L
Improper Input Validation

<1.0.3-1
  • L
Improper Input Validation

<1.0.3-1
  • M
Improper Input Validation

<1.0.3-1
  • M
Out-of-Bounds

<1.0.3-1
  • L
Improper Input Validation

<1.0.2-1
  • L
Information Exposure

<1.0.1-1
  • L
Information Exposure

<1.0.1-1
  • L
Improper Input Validation

<1.0.1-1
  • L
CVE-2008-3140

<1.0.1-1
  • L
Information Exposure

<1.0.1-1
  • L
CVE-2008-1561

<1.0.0-1
  • L
CVE-2008-1563

<1.0.0-1
  • L
CVE-2008-1072

<0.99.8-1
  • L
CVE-2008-1070

<0.99.8-1
  • L
Resource Management Errors

<0.99.8-1
  • M
Access Restriction Bypass

<0.99.7-1
  • M
Resource Management Errors

<0.99.7-1
  • M
Out-of-Bounds

<0.99.7-1
  • M
Resource Management Errors

<0.99.7-1
  • M
CVE-2007-6450

<0.99.7-1
  • M
Out-of-Bounds

<0.99.7~pre1-1
  • M
Out-of-Bounds

<0.99.7~pre1-1
  • L
Improper Input Validation

<0.99.7~pre1-1
  • M
CVE-2007-6117

<0.99.7~pre1-1
  • L
CVE-2007-6118

<0.99.7~pre1-1
  • M
Out-of-Bounds

<0.99.7~pre1-1
  • L
CVE-2007-6111

<0.99.7~pre1-1
  • L
Out-of-Bounds

<0.99.7~pre1-1
  • L
CVE-2007-6119

<0.99.7~pre1-1
  • L
CVE-2007-6116

<0.99.7~pre1-1
  • L
Numeric Errors

<0.99.6pre1-1
  • M
Improper Input Validation

<0.99.6pre1-1
  • M
CVE-2007-3393

<0.99.6pre1-1
  • M
CVE-2007-3390

<0.99.6pre1-1
  • M
CVE-2007-3392

<0.99.6pre1-1
  • H
Improper Input Validation

<0.99.6pre1-1
  • L
CVE-2007-0456

<0.99.4-5
  • L
CVE-2007-0459

<0.99.4-5
  • L
CVE-2007-0458

<0.99.4-5
  • L
CVE-2007-0457

<0.99.4-5
  • M
CVE-2006-4574

<0.99.4-1
  • M
CVE-2006-5595

<0.99.4-1
  • M
CVE-2006-5469

<0.99.4-1
  • M
CVE-2006-4805

<0.99.4-1
  • M
CVE-2006-5740

<0.99.4-1
  • M
CVE-2006-5468

<0.99.4-1
  • M
CVE-2006-4330

<0.99.2-5
  • M
CVE-2006-4331

<0.99.2-5.1
  • L
Resource Management Errors

<0.99.2-5.1
  • H
Resource Management Errors

<0.99.2-1
  • H
Resource Management Errors

<0.99.2-1
  • H
CVE-2006-3629

<0.99.2-1
  • H
Numeric Errors

<0.99.2-1
  • H
Out-of-Bounds

<0.99.2-1
  • H
Use of Externally-Controlled Format String

<0.99.2-1