wireshark-ui-qt vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wireshark-ui-qt package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

<3.6.10-150000.3.78.1
  • M
NULL Pointer Dereference

<2.4.7-3.3.4
  • M
Use After Free

<2.4.7-3.3.4
  • M
Out-of-Bounds

<2.4.7-3.3.4
  • L
Integer Overflow or Wraparound

<2.4.8-3.6.1
  • L
Out-of-bounds Read

<2.4.8-3.6.1
  • L
Excessive Iteration

<2.4.8-3.6.1
  • L
Unchecked Return Value

<2.4.8-3.6.1
  • L
Integer Overflow or Wraparound

<2.4.8-3.6.1
  • M
Improper Input Validation

<2.4.7-3.3.4
  • M
NULL Pointer Dereference

<2.4.7-3.3.4
  • M
Out-of-bounds Read

<2.4.7-3.3.4
  • H
CVE-2018-16057

<2.4.9-3.9.1
  • H
Improper Initialization

<2.4.9-3.9.1
  • L
Out-of-bounds Read

<2.4.8-3.6.1
  • L
Improper Input Validation

<2.4.8-3.6.1
  • L
Improper Input Validation

<2.4.8-3.6.1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.8-3.6.1
  • L
Out-of-bounds Read

<2.4.8-3.6.1
  • H
CVE-2018-16056

<2.4.9-3.9.1
  • H
NULL Pointer Dereference

<2.4.10-3.12.2
  • H
Out-of-bounds Write

<2.4.10-3.12.2
  • M
Out-of-bounds Read

<2.4.11-3.15.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2.4.11-3.15.1
  • M
Use of a Broken or Risky Cryptographic Algorithm

<2.4.12-3.19.1
  • M
Use After Free

<2.4.12-3.19.1
  • M
Out-of-bounds Read

<2.4.11-3.15.1
  • M
NULL Pointer Dereference

<2.4.11-3.15.1
  • M
Out-of-bounds Read

<2.4.11-3.15.1
  • M
Out-of-bounds Write

<2.4.11-3.15.1
  • M
Improper Input Validation

<2.4.12-3.19.1
  • M
Out-of-bounds Read

<2.4.12-3.19.1
  • M
NULL Pointer Dereference

<2.4.13-3.22.1
  • M
NULL Pointer Dereference

<2.4.13-3.22.1
  • M
Off-by-one Error

<2.4.13-3.22.1
  • M
NULL Pointer Dereference

<2.4.14-3.25.2
  • M
Out-of-bounds Read

<2.4.14-3.25.2
  • M
Reachable Assertion

<2.4.14-3.25.2
  • M
Out-of-bounds Read

<2.4.14-3.25.2
  • M
Out-of-bounds Write

<2.4.14-3.25.2
  • M
Out-of-bounds Read

<2.4.14-3.25.2
  • L
SUSE-SU-2019:1607-1

<2.4.15-3.28.7
  • M
Out-of-Bounds

<2.4.16-3.31.1
  • M
Allocation of Resources Without Limits or Throttling

<3.4.5-3.53.1
  • H
Arbitrary Code Injection

<3.4.5-3.53.1
  • M
Allocation of Resources Without Limits or Throttling

<3.4.5-3.53.1
  • M
Memory Leak

<3.4.5-3.53.1
  • M
Buffer Overflow

<3.4.5-3.53.1
  • M
Out-of-bounds Read

<3.4.5-3.53.1
  • L
Memory Leak

<3.4.5-3.53.1
  • M
Memory Leak

<3.4.5-3.53.1
  • L
Memory Leak

<3.4.5-3.53.1
  • M
Excessive Iteration

<3.6.1-3.68.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.1-3.68.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.1-3.68.1
  • L
Out-of-bounds Read

<3.6.1-3.68.1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.1-3.68.1
  • M
Out-of-bounds Read

<3.6.1-3.68.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<3.6.2-3.71.1
  • H
Excessive Iteration

<3.6.2-3.71.1
  • H
Out-of-bounds Write

<3.6.2-3.71.1
  • H
NULL Pointer Dereference

<3.6.2-3.71.1
  • H
Use After Free

<3.6.2-3.71.1