wireshark vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wireshark package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • H
Arbitrary Code Injection

*
  • H
Missing Initialization of Resource

*
  • H
Arbitrary Code Injection

*
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u19
  • H
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u19
  • H
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u19
  • H
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u19
  • H
Reachable Assertion

<1.12.1+g01b65bf-4+deb8u19
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u18
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u17
  • M
Use of a Broken or Risky Cryptographic Algorithm

<1.12.1+g01b65bf-4+deb8u17
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u17
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • M
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u16
  • M
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u16
  • M
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u16
  • H
Out-of-bounds Write

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-16057

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Initialization

<1.12.1+g01b65bf-4+deb8u16
  • H
Out-of-bounds Write

*
  • H
Excessive Iteration

<1.12.1+g01b65bf-4+deb8u15
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u15
  • H
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u15
  • H
Integer Overflow or Wraparound

<1.12.1+g01b65bf-4+deb8u15
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u15
  • H
Integer Overflow or Wraparound

<1.12.1+g01b65bf-4+deb8u15
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u15
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u16
  • H
Use After Free

<1.12.1+g01b65bf-4+deb8u14
  • H
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u14
  • H
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Missing Release of Resource after Effective Lifetime

<1.12.1+g01b65bf-4+deb8u16
  • H
Excessive Iteration

<1.12.1+g01b65bf-4+deb8u14
  • H
CVE-2018-9263

<1.12.1+g01b65bf-4+deb8u16
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Missing Release of Resource after Effective Lifetime

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Missing Release of Resource after Effective Lifetime

*
  • H
Missing Release of Resource after Effective Lifetime

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7335

<1.12.1+g01b65bf-4+deb8u14
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Initialization

<1.12.1+g01b65bf-4+deb8u14
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7417

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7420

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7418

<1.12.1+g01b65bf-4+deb8u16
  • H
Excessive Iteration

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7337

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u16
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
CVE-2018-7334

<1.12.1+g01b65bf-4+deb8u14
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u13
  • H
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u13
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u13
  • H
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u16
  • H
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Check for Unusual or Exceptional Conditions

<1.12.1+g01b65bf-4+deb8u12
  • H
Improper Check for Unusual or Exceptional Conditions

<1.12.1+g01b65bf-4+deb8u12
  • H
Improper Check for Unusual or Exceptional Conditions

<1.12.1+g01b65bf-4+deb8u12
  • H
Use of Externally-Controlled Format String

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

*
  • H
Out-of-bounds Read

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u12
  • H
Excessive Iteration

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
Uncontrolled Recursion

<1.12.1+g01b65bf-4+deb8u16
  • M
Uncontrolled Recursion

*
  • M
Uncontrolled Recursion

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u18
  • H
Out-of-Bounds

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Improper Input Validation

*
  • H
Divide By Zero

<1.12.1+g01b65bf-4+deb8u18
  • H
NULL Pointer Dereference

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u16
  • H
Arbitrary Code Injection

<1.12.1+g01b65bf-4+deb8u16
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u16
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u11
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u11
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u11
  • H
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<1.12.1+g01b65bf-4+deb8u11
  • H
Integer Overflow or Wraparound

<1.12.1+g01b65bf-4+deb8u11
  • H
Integer Overflow or Wraparound

<1.12.1+g01b65bf-4+deb8u11
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u10
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u10
  • M
Use After Free

<1.12.1+g01b65bf-4+deb8u10
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u10
  • M
Use After Free

<1.12.1+g01b65bf-4+deb8u9
  • M
Out-of-bounds Write

<1.12.1+g01b65bf-4+deb8u9
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u9
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u9
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u9
  • M
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u7
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u7
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u7
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u7
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u7
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u7
  • H
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u7
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u7
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u8
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u8
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u8
  • M
Divide By Zero

<1.12.1+g01b65bf-4+deb8u8
  • M
Numeric Errors

<1.12.1+g01b65bf-4+deb8u8
  • M
NULL Pointer Dereference

<1.12.1+g01b65bf-4+deb8u8
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u8
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u8
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u5
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u5
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u5
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u6
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u6
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u6
  • M
Improper Access Control

<1.12.1+g01b65bf-4+deb8u6
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u6
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u6
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u5
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u5
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u5
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u5
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u5
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u4
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u3
  • M
Improper Input Validation

<1.12.1+g01b65bf-4+deb8u2
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u2
  • H
Numeric Errors

<1.12.1+g01b65bf-4+deb8u1
  • M
Numeric Errors

<1.12.1+g01b65bf-4+deb8u1
  • M
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u1
  • H
Numeric Errors

<1.12.1+g01b65bf-4+deb8u1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u1
  • H
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-4+deb8u1
  • H
Resource Management Errors

<1.12.1+g01b65bf-4+deb8u1
  • M
Code

<1.12.1+g01b65bf-4+deb8u1
  • M
Improper Input Validation

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
Improper Data Handling

<1.12.1+g01b65bf-4
  • M
Improper Data Handling

<1.12.1+g01b65bf-4
  • M
Numeric Errors

<1.12.1+g01b65bf-4
  • M
CVE-2015-0559

<1.12.1+g01b65bf-3
  • M
Out-of-Bounds

<1.12.1+g01b65bf-3
  • M
Improper Input Validation

<1.12.1+g01b65bf-3
  • M
Improper Input Validation

<1.12.1+g01b65bf-3
  • M
CVE-2015-0562

<1.12.1+g01b65bf-3
  • M
Improper Data Handling

<1.12.1+g01b65bf-3
  • M
Out-of-Bounds

<1.12.1+g01b65bf-2
  • M
Resource Management Errors

<1.12.1+g01b65bf-2
  • M
Numeric Errors

<1.12.1+g01b65bf-2
  • M
Out-of-Bounds

<1.12.1+g01b65bf-2
  • M
Resource Management Errors

<1.12.1+g01b65bf-2
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
CVE-2014-6421

<1.12.0~rc1-1
  • M
Improper Input Validation

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.1+g01b65bf-1
  • M
Resource Management Errors

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Improper Input Validation

<1.12.1+g01b65bf-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • M
Out-of-Bounds

<1.12.0+git+4fab41a1-1
  • H
Out-of-Bounds

<1.10.4-1
  • M
Numeric Errors

<1.10.8-1
  • M
CVE-2014-2907

<1.10.7-1
  • M
Out-of-Bounds

<1.10.6-1
  • M
CVE-2014-2283

<1.10.6-1
  • H
Out-of-Bounds

<1.10.6-1
  • M
Improper Input Validation

<1.10.6-1
  • M
Out-of-Bounds

<1.10.4-1
  • M
Improper Input Validation

<1.10.4-1
  • M
Improper Input Validation

<1.10.4-1
  • M
Improper Input Validation

<1.10.3-1
  • M
CVE-2013-6337

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • M
Improper Input Validation

<1.10.3-1
  • M
Out-of-Bounds

<1.10.2-1
  • M
CVE-2013-5722

<1.10.2-1
  • M
Improper Input Validation

<1.10.2-1
  • M
Access Restriction Bypass

<1.10.2-1
  • M
Resource Management Errors

<1.10.2-1
  • M
Improper Input Validation

<1.10.2-1
  • M
Resource Management Errors

<1.10.1-1
  • H
Numeric Errors

<1.10.1-1
  • M
CVE-2013-4936

<1.10.1-1
  • M
Resource Management Errors

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • H
Numeric Errors

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Resource Management Errors

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Out-of-Bounds

<1.10.1-1
  • H
Numeric Errors

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • M
Numeric Errors

<1.10.1-1
  • M
Improper Input Validation

<1.10.1-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Resource Management Errors

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Improper Input Validation

<1.10.0-1
  • M
Numeric Errors

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Improper Input Validation

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Out-of-Bounds

<1.10.0-1
  • M
Use of Externally-Controlled Format String

<1.8.7-1
  • M
Improper Input Validation

<1.8.7-1
  • M
Numeric Errors

<1.8.7-1
  • M
Numeric Errors

<1.8.7-1
  • M
Numeric Errors

<1.8.7-1
  • M
Out-of-Bounds

<1.8.7-1
  • M
CVE-2013-2482

<1.8.6-1
  • M
Out-of-Bounds

<1.8.2-5
  • L
Numeric Errors

<1.8.2-5
  • M
CVE-2013-2475

<1.8.2-5
  • M
CVE-2013-2479

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
CVE-2013-2484

<1.8.2-5
  • M
Numeric Errors

<1.8.2-5
  • M
Resource Management Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.2-5
  • M
CVE-2013-2480

<1.8.2-5
  • H
Numeric Errors

<1.8.6-1
  • M
CVE-2013-2485

<1.8.6-1
  • M
Improper Input Validation

<1.8.2-5
  • L
Resource Management Errors

<1.8.6-1
  • L
Numeric Errors

<1.8.6-1
  • L
Resource Management Errors

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Out-of-Bounds

<1.8.6-1
  • L
Cryptographic Issues

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Out-of-Bounds

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
CVE-2013-1587

<1.8.6-1
  • L
CVE-2013-1586

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • L
Improper Input Validation

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Improper Input Validation

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Information Exposure

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Numeric Errors

<1.8.6-1
  • M
Improper Input Validation

<1.8.6-1
  • M
Out-of-Bounds

<1.8.2-2
  • M
CVE-2012-5238

<1.8.2-2
  • M
Resource Management Errors

<1.8.2-2
  • M
Resource Management Errors

<1.8.2-2
  • M
Numeric Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • H
Out-of-Bounds

<1.8.2-1
  • M
Improper Input Validation

<1.8.2-1
  • M
Out-of-Bounds

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • M
Resource Management Errors

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • M
Numeric Errors

<1.8.2-1
  • M
Improper Input Validation

<1.8.2-1
  • M
Arbitrary Code Injection

<1.8.2-1
  • L
Arbitrary Code Injection

<1.8.2-1
  • M
Out-of-Bounds

<1.6.8-1
  • M
Numeric Errors

<1.6.8-1
  • M
Out-of-Bounds

<1.6.8-1
  • M
Numeric Errors

<1.6.8-1
  • M
Resource Management Errors

<1.6.8-1
  • M
Resource Management Errors

<1.6.6-1
  • M
Improper Input Validation

<1.6.5-1
  • M
Improper Input Validation

<1.6.5-1
  • M
Arbitrary Code Injection

<1.6.6-1
  • M
CVE-2012-1593

<1.6.6-1
  • M
Improper Input Validation

<1.6.5-1
  • M
Improper Input Validation

<1.6.5-1
  • L
CVE-2012-0042

<1.6.5-1
  • M
Out-of-Bounds

<1.6.5-1
  • M
Resource Management Errors

<1.6.6-1
  • M
Resource Management Errors

<1.6.3-1
  • M
Out-of-Bounds

<1.6.3-1
  • M
CVE-2011-4101

<1.6.3-1
  • M
Out-of-Bounds

<1.6.2-1
  • M
Improper Input Validation

<1.6.2-1
  • H
CVE-2011-3360

<1.6.2-1
  • M
Resource Management Errors

<1.6.2-1
  • L
Resource Management Errors

<1.6.2-1
  • M
Numeric Errors

<1.6.1-1
  • M
Resource Management Errors

<1.6.1-1
  • M
CVE-2011-1958

<1.6.0-1
  • M
CVE-2011-1956

<1.4.6-1
  • M
Out-of-Bounds

<1.6.0-1
  • M
Resource Management Errors

<1.6.0-1
  • M
Numeric Errors

<1.6.0-1
  • M
Resource Management Errors

<1.6.0-1
  • M
Resource Management Errors

<1.4.5-1
  • H
Out-of-Bounds

<1.4.5-1
  • H
Out-of-Bounds

<1.2-0-1
  • M
Numeric Errors

<1.4.4-1
  • M
Resource Management Errors

<1.4.4-1
  • M
Resource Management Errors

<1.4.4-1
  • M
Out-of-Bounds

<1.4.4-1
  • M
CVE-2011-1143

<1.4.4-1
  • M
Resource Management Errors

<1.4.4-1
  • M
Resource Management Errors

<1.4.4-1
  • M
Out-of-Bounds

<1.4.3-3
  • C
Out-of-Bounds

<1.2.11-6
  • H
Out-of-Bounds

<1.2.11-6
  • M
Resource Management Errors

<1.2.11-3
  • H
Out-of-Bounds

<1.2.11-4
  • C
Numeric Errors

<1.2.10-1
  • C
Out-of-Bounds

<1.2.10-1
  • M
Improper Input Validation

<1.2.10-1
  • M
CVE-2010-2992

<1.2.10-1
  • M
Resource Management Errors

<1.2.9-1
  • M
CVE-2010-2285

<1.2.9-1
  • H
Out-of-Bounds

<1.2.9-1
  • H
Out-of-Bounds

<1.2.9-1
  • M
CVE-2010-2283

<1.2.9-1
  • M
Improper Input Validation

<1.2.8-1
  • H
Out-of-Bounds

<1.2.6-1
  • M
CVE-2009-4377

<1.2.5-1
  • H
Out-of-Bounds

<1.2.5-1
  • H
Numeric Errors

<1.2.2-1
  • M
Numeric Errors

<1.2.3-1
  • M
CVE-2009-3550

<1.2.3-1
  • M
Improper Input Validation

<1.2.3-1
  • H
CVE-2009-3241

<1.2.2-1
  • M
CVE-2009-3242

<1.2.2-1
  • M
Out-of-Bounds

<1.2.1-1
  • M
CVE-2009-2561

<1.2.1-1
  • M
CVE-2009-2560

<1.2.1-1
  • M
CVE-2009-2562

<1.2.1-1
  • M
CVE-2009-2563

<1.2.1-1
  • M
CVE-2009-1829

<1.0.8-1
  • M
Improper Input Validation

<1.0.7-1
  • M
CVE-2009-1269

<1.0.7-1
  • C
Use of Externally-Controlled Format String

<1.0.7-1
  • M
Resource Management Errors

<1.0.5-1
  • M
Use of Externally-Controlled Format String

<1.0.6-1
  • M
Out-of-Bounds

<1.0.6-1
  • M
Improper Input Validation

<1.0.6-1
  • M
Resource Management Errors

<1.0.5-1
  • M
Resource Management Errors

<1.0.4-1
  • M
Resource Management Errors

<1.0.4-1
  • M
Improper Input Validation

<1.0.4-1
  • M
Resource Management Errors

<1.0.4-1
  • M
Improper Input Validation

<1.0.4-1
  • M
Resource Management Errors

<1.0.4-1
  • M
Improper Input Validation

<1.0.3-1
  • M
Improper Input Validation

<1.0.3-1
  • M
Improper Input Validation

<1.0.3-1
  • C
Out-of-Bounds

<1.0.3-1
  • M
Improper Input Validation

<1.0.2-1
  • M
Information Exposure

<1.0.1-1
  • M
Information Exposure

<1.0.1-1
  • M
CVE-2008-3140

<1.0.1-1
  • M
Improper Input Validation

<1.0.1-1
  • M
Information Exposure

<1.0.1-1
  • M
CVE-2008-1561

<1.0.0-1
  • M
CVE-2008-1563

<1.0.0-1
  • M
Resource Management Errors

<0.99.8-1
  • M
CVE-2008-1072

<0.99.8-1
  • M
CVE-2008-1070

<0.99.8-1
  • M
CVE-2007-6450

<0.99.7-1
  • M
Resource Management Errors

<0.99.7-1
  • M
Access Restriction Bypass

<0.99.7-1
  • M
Out-of-Bounds

<0.99.7-1
  • M
Resource Management Errors

<0.99.7-1
  • M
Out-of-Bounds

<0.99.7~pre1-1
  • M
Improper Input Validation

<0.99.7~pre1-1
  • M
Numeric Errors

<0.99.6pre1-1
  • H
CVE-2007-6119

<0.99.7~pre1-1
  • M
CVE-2007-6116

<0.99.7~pre1-1
  • H
CVE-2007-6118

<0.99.7~pre1-1
  • C
Out-of-Bounds

<0.99.7~pre1-1
  • M
CVE-2007-6117

<0.99.7~pre1-1
  • C
Out-of-Bounds

<0.99.7~pre1-1
  • C
Out-of-Bounds

<0.99.7~pre1-1
  • M
CVE-2007-6111

<0.99.7~pre1-1
  • M
CVE-2007-3392

<0.99.6pre1-1
  • M
CVE-2007-3390

<0.99.6pre1-1
  • M
CVE-2007-3393

<0.99.6pre1-1
  • M
Improper Input Validation

<0.99.6pre1-1
  • H
Improper Input Validation

<0.99.6pre1-1
  • M
CVE-2007-0456

<0.99.4-5
  • M
CVE-2007-0457

<0.99.4-5
  • M
CVE-2007-0459

<0.99.4-5
  • M
CVE-2007-0458

<0.99.4-5
  • M
CVE-2006-5595

<0.99.4-1
  • H
CVE-2006-4574

<0.99.4-1
  • M
CVE-2006-5469

<0.99.4-1
  • M
CVE-2006-4805

<0.99.4-1
  • M
CVE-2006-5468

<0.99.4-1
  • M
CVE-2006-5740

<0.99.4-1
  • M
CVE-2006-4331

<0.99.2-5.1
  • M
Resource Management Errors

<0.99.2-5.1
  • M
CVE-2006-4330

<0.99.2-5
  • M
Resource Management Errors

<0.99.2-1
  • M
Resource Management Errors

<0.99.2-1
  • C
Out-of-Bounds

<0.99.2-1
  • H
CVE-2006-3629

<0.99.2-1
  • C
Use of Externally-Controlled Format String

<0.99.2-1
  • H
Numeric Errors

<0.99.2-1